Struts2Scanner


Apache Struts is a free, open-source framework for creating elegant, modern Java web applications. It has its share of critical vulnerabilities, with one of its features, OGNL – Object-Graph Navigation Language, being at the core of many of them.

Struts2Scanner is a vulnerability scanner to find out if a target endpoint is vulnerable to struts2 vulnerabilities. Currently it checks against following vulnerabilities.

  • cve-2020-17530
  • cve-2019-0230
  • cve-2018-11776
  • cve-2017-5638
  • cve-2017-9791

How to use

root@kali:/home/Struts2Scanner# python3 Struts2Scanner.py -h
usage: Struts2Scanner.py [options] --url "http://www.site.com/vuln.php?id=1"

optional arguments:
  -h, --help         show this help message and exit
  -u URL, --url URL  Target URL (e.g."http://www.site.com/vuln.php?id=1&fname=test&lname=tester")
  --data DATA        Data string to be sent through POST (e.g. "id=1&fname=test&lname=tester")
  --cookies COOKIES  HTTP cookies (eg. "jsessionid=1234")
  --proxy PROXY      Use a proxy to connect to the target URL

Capture

Requirements

  • Python3
  • Check requirements.txt file

Installation Steps

pip3 install -r requirements.txt

Sunil Katakdhond
Sunil Katakdhond
Cyber Security Analyst - Penetration Tester

My research interests include Penetration Testing, Exploit Development and IT Infrastructure Security.

Related