@@ -18,16 +18,14 @@ def initialize(info={})
18
18
This module exploits the classLoader Apache Struts2 vulnerability
19
19
to inject a JSP shell over SMB.
20
20
} ,
21
- 'Author' => [
22
- 'Matthew Hall <[email protected] >' ,
23
- ] ,
21
+ 'Author' =>
22
+ [
23
+ 'Matthew Hall <[email protected] >'
24
+ ] ,
24
25
'DisclosureDate' => 'May 1 2014' ,
25
- 'Platform' => 'win' ,
26
- 'Privileged' => true ,
27
26
'References' =>
28
27
[
29
- [ 'URL' , 'http://www.sec-1.com/blog/' ] ,
30
- [ 'CVE' , '2014-0094' ] ,
28
+ [ 'CVE' , '2014-0094' ]
31
29
] ,
32
30
'DefaultOptions' =>
33
31
{
@@ -47,14 +45,18 @@ def initialize(info={})
47
45
]
48
46
] ,
49
47
'DefaultTarget' => 0 ,
50
- ) )
51
- register_options (
52
- [
53
- OptString . new ( 'URI' , [ true , 'Path to vulnerable Struts action file' , '/struts2-showcase/showcase.action' , true ] ) ,
54
- OptString . new ( 'FILE_NAME' , [ true , 'A static JSP name (ie. "/example/HelloWorld.jsp")' , 'showcase.jsp' ] ) ,
55
- Opt ::RPORT ( 8080 )
56
- ] , self . class )
57
- deregister_options ( 'FILE_CONTENTS' )
48
+ ) )
49
+
50
+ register_options (
51
+ [
52
+ OptString . new ( 'URI' , [ true , 'Path to vulnerable Struts action file' , '/struts2-blank/example/HelloWorld.action' , true ] ) ,
53
+ OptString . new ( 'FILE_NAME' , [ true , 'A static JSP name' , 'HelloWorld.jsp' ] ) ,
54
+ OptString . new ( 'FOLDER_NAME' , [ true , 'A static Folder' , 'example' ] ) ,
55
+ OptString . new ( 'SHARE' , [ true , 'Share' , 'share' ] ) ,
56
+ Opt ::RPORT ( 8080 )
57
+ ] , self . class )
58
+
59
+ deregister_options ( 'FILE_CONTENTS' )
58
60
end
59
61
60
62
def check
0 commit comments