-
Notifications
You must be signed in to change notification settings - Fork 584
Description
Proposal
I'd like to propose adding an exploit example for CVE-2024-9999, a critical authentication bypass vulnerability discovered in Apache Struts 2.x versions. This vulnerability allows remote attackers to bypass authentication mechanisms through specially crafted OGNL expressions in HTTP headers.
Exploit Overview
The vulnerability exists in the authentication filter implementation where user-supplied input from the X-Forwarded-For header is processed without proper sanitization. An attacker can inject malicious OGNL expressions that evaluate to admin privileges, effectively bypassing authentication.
Suggested Implementation
Structure
- Create a new directory:
/apache-struts-auth-bypass-2024 - Main exploit script:
exploit.py - Documentation:
README.mdwith detailed explanation - Test environment setup:
docker-compose.ymlfor safe testing
Key Components
- Target detection: Version fingerprinting module
- Payload generation: OGNL expression builder
- Exploitation: HTTP request crafting with malicious headers
- Post-exploitation: Session token extraction and verification
Technologies
- Python 3.8+
- Requests library for HTTP operations
- Beautiful Soup for response parsing
Getting Started for Contributors
- Research Phase: Review the CVE details and understand the vulnerability mechanism
- Environment Setup: Set up a vulnerable test instance using Docker
- Proof of Concept: Start with a simple PoC that demonstrates the bypass
- Exploit Development: Build the full-featured exploit with error handling
- Documentation: Add clear instructions and ethical use warnings
Resources
- CVE-2024-9999 official advisory
- Apache Struts security bulletins
- OGNL injection reference guides
Ethical Considerations
This exploit should only be used for:
- Educational purposes
- Authorized penetration testing
- Security research in controlled environments
Contributors should include prominent disclaimers about responsible disclosure and legal use.
Looking forward to collaboration on this! Happy to provide guidance to anyone interested in working on this.