PoC-in-GitHub/2017/CVE-2017-5638.json

416 lines
14 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
2019-12-12 06:14:27 +01:00
"id": 84693026,
"name": "struts-pwn",
"full_name": "mazen160\/struts-pwn",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn",
"description": "An exploit for Apache Struts CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2017-03-12T02:02:25Z",
2020-08-04 23:08:49 +02:00
"updated_at": "2020-08-04T19:12:52Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2018-05-21T18:33:26Z",
2020-08-04 23:08:49 +02:00
"stargazers_count": 372,
"watchers_count": 372,
2020-04-17 11:08:24 +02:00
"forks_count": 131,
"forks": 131,
2020-08-04 23:08:49 +02:00
"watchers": 372,
2020-08-03 05:09:52 +02:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 85664016,
"name": "st2-046-poc",
"full_name": "jas502n\/st2-046-poc",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/jas502n\/st2-046-poc",
"description": "st2-046-poc CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2017-03-21T05:47:49Z",
2020-05-21 17:07:52 +02:00
"updated_at": "2020-05-21T14:53:21Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2018-08-17T05:15:41Z",
2020-05-21 17:07:52 +02:00
"stargazers_count": 21,
"watchers_count": 21,
2020-05-12 05:07:35 +02:00
"forks_count": 28,
"forks": 28,
2020-05-21 17:07:52 +02:00
"watchers": 21,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 87695524,
"name": "strutsy",
"full_name": "tahmed11\/strutsy",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "tahmed11",
"id": 25324534,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25324534?v=4",
"html_url": "https:\/\/github.com\/tahmed11"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/tahmed11\/strutsy",
"description": "Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2017-04-09T08:57:08Z",
2020-05-18 17:09:13 +02:00
"updated_at": "2020-05-18T10:42:03Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2018-09-01T10:15:30Z",
2020-05-18 17:09:13 +02:00
"stargazers_count": 11,
"watchers_count": 11,
2020-05-13 11:09:18 +02:00
"forks_count": 12,
"forks": 12,
2020-05-18 17:09:13 +02:00
"watchers": 11,
2019-12-12 06:14:27 +01:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 105124155,
2019-12-08 14:19:20 +01:00
"name": "CVE-2017-5638",
2019-12-12 06:14:27 +01:00
"full_name": "lizhi16\/CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "lizhi16",
"id": 22630810,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22630810?v=4",
"html_url": "https:\/\/github.com\/lizhi16"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/lizhi16\/CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"description": null,
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2017-09-28T08:43:21Z",
"updated_at": "2018-03-27T09:10:07Z",
"pushed_at": "2018-03-25T02:49:17Z",
2019-12-08 14:19:20 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
{
"id": 117999664,
"name": "cybersecurity-struts2",
"full_name": "grant100\/cybersecurity-struts2",
"owner": {
"login": "grant100",
"id": 28523112,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28523112?v=4",
"html_url": "https:\/\/github.com\/grant100"
},
"html_url": "https:\/\/github.com\/grant100\/cybersecurity-struts2",
"description": "Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.",
"fork": false,
"created_at": "2018-01-18T15:19:39Z",
"updated_at": "2019-01-23T00:39:32Z",
"pushed_at": "2019-01-23T00:39:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 119230111,
"name": "apache-struts-v2-CVE-2017-5638",
"full_name": "cafnet\/apache-struts-v2-CVE-2017-5638",
"owner": {
"login": "cafnet",
"id": 12993208,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12993208?v=4",
"html_url": "https:\/\/github.com\/cafnet"
},
"html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638",
"description": "Working POC for CVE 2017-5638",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-01-28T05:17:04Z",
"updated_at": "2018-01-28T05:55:11Z",
"pushed_at": "2018-01-28T05:55:09Z",
2019-12-09 16:30:32 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
2019-12-12 06:14:27 +01:00
"id": 121659152,
2019-12-09 16:30:32 +01:00
"name": "CVE-2017-5638",
2019-12-12 06:14:27 +01:00
"full_name": "0x00-0x00\/CVE-2017-5638",
2019-12-09 16:30:32 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
2019-12-09 16:30:32 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2017-5638",
"description": "Struts02 s2-045 exploit program",
2019-12-09 16:30:32 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-02-15T17:31:07Z",
"updated_at": "2019-03-27T18:13:56Z",
"pushed_at": "2018-02-15T17:36:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-27 06:17:04 +01:00
{
"id": 123348547,
"name": "struts2_cve-2017-5638",
"full_name": "m3ssap0\/struts2_cve-2017-5638",
"owner": {
"login": "m3ssap0",
"id": 705120,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/705120?v=4",
"html_url": "https:\/\/github.com\/m3ssap0"
},
"html_url": "https:\/\/github.com\/m3ssap0\/struts2_cve-2017-5638",
"description": "This is a sort of Java porting of the Python exploit at: https:\/\/www.exploit-db.com\/exploits\/41570\/.",
"fork": false,
"created_at": "2018-02-28T22:11:50Z",
"updated_at": "2018-03-17T10:17:06Z",
"pushed_at": "2018-03-10T11:56:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 125206287,
"name": "struts2-jakarta-inject",
"full_name": "Greynad\/struts2-jakarta-inject",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "Greynad",
"id": 5173529,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5173529?v=4",
"html_url": "https:\/\/github.com\/Greynad"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/Greynad\/struts2-jakarta-inject",
"description": "Golang exploit for CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-03-14T12:04:34Z",
"updated_at": "2018-03-28T19:59:04Z",
"pushed_at": "2018-03-19T17:57:29Z",
"stargazers_count": 2,
"watchers_count": 2,
2019-12-08 14:19:20 +01:00
"forks_count": 0,
"forks": 0,
2019-12-12 06:14:27 +01:00
"watchers": 2,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-12 05:48:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 126003106,
"name": "struts-rce",
"full_name": "ggolawski\/struts-rce",
"owner": {
"login": "ggolawski",
"id": 35563296,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35563296?v=4",
"html_url": "https:\/\/github.com\/ggolawski"
},
"html_url": "https:\/\/github.com\/ggolawski\/struts-rce",
"description": "Apache Struts CVE-2017-5638 RCE exploitation",
"fork": false,
"created_at": "2018-03-20T10:51:46Z",
"updated_at": "2018-05-18T09:54:51Z",
"pushed_at": "2018-03-20T11:32:35Z",
"stargazers_count": 1,
"watchers_count": 1,
2020-04-12 17:10:36 +02:00
"forks_count": 1,
"forks": 1,
2019-12-12 06:14:27 +01:00
"watchers": 1,
"score": 0
},
{
"id": 133253539,
2019-12-12 05:48:20 +01:00
"name": "CVE-2017-5638",
2019-12-12 06:14:27 +01:00
"full_name": "win3zz\/CVE-2017-5638",
2019-12-12 05:48:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "win3zz",
"id": 12781459,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12781459?v=4",
"html_url": "https:\/\/github.com\/win3zz"
2019-12-12 05:48:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/win3zz\/CVE-2017-5638",
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
2019-12-12 05:48:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-05-13T16:13:26Z",
2020-06-16 23:08:12 +02:00
"updated_at": "2020-06-16T16:39:14Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2018-05-13T16:14:53Z",
2020-06-16 23:08:12 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2020-06-18 23:08:04 +02:00
"forks_count": 2,
"forks": 2,
2020-06-16 23:08:12 +02:00
"watchers": 1,
2019-12-12 05:48:20 +01:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 138520346,
"name": "CVE-2017-5638-Mass-Exploit",
"full_name": "leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit",
"owner": {
"login": "leandrocamposcardoso",
"id": 13025156,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13025156?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/leandrocamposcardoso"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit",
"description": null,
"fork": false,
"created_at": "2018-06-24T22:40:54Z",
"updated_at": "2018-06-24T22:41:48Z",
2020-06-07 11:07:49 +02:00
"pushed_at": "2020-06-07T07:06:32Z",
2019-12-08 14:19:20 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 138721867,
"name": "struts2-rce",
"full_name": "Iletee\/struts2-rce",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "Iletee",
"id": 1454138,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1454138?v=4",
"html_url": "https:\/\/github.com\/Iletee"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/Iletee\/struts2-rce",
"description": "Exploitable target to CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-06-26T10:21:50Z",
"updated_at": "2019-11-12T10:42:33Z",
2020-01-15 23:00:02 +01:00
"pushed_at": "2020-01-15T16:12:07Z",
2019-12-12 06:14:27 +01:00
"stargazers_count": 8,
"watchers_count": 8,
2020-08-12 17:08:37 +02:00
"forks_count": 135,
"forks": 135,
2019-12-12 06:14:27 +01:00
"watchers": 8,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 147389150,
"name": "check_struts",
"full_name": "andypitcher\/check_struts",
"owner": {
"login": "andypitcher",
"id": 12878731,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12878731?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/andypitcher"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/andypitcher\/check_struts",
"description": "Apache Struts version analyzer (Ansible) based on CVE-2017-5638",
"fork": false,
"created_at": "2018-09-04T18:19:26Z",
2020-03-06 04:07:35 +01:00
"updated_at": "2020-03-05T21:25:49Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2018-10-29T21:49:54Z",
2020-03-06 04:07:35 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2019-12-08 14:19:20 +01:00
"forks_count": 0,
"forks": 0,
2020-03-06 04:07:35 +01:00
"watchers": 1,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 158640611,
"name": "CVE-2017-5638",
"full_name": "un4ckn0wl3z\/CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "un4ckn0wl3z",
"id": 16059320,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16059320?v=4",
"html_url": "https:\/\/github.com\/un4ckn0wl3z"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/un4ckn0wl3z\/CVE-2017-5638",
2019-12-08 14:19:20 +01:00
"description": null,
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-11-22T04:02:59Z",
"updated_at": "2018-11-22T07:57:38Z",
"pushed_at": "2018-11-22T04:08:08Z",
"stargazers_count": 1,
"watchers_count": 1,
2020-03-20 04:08:46 +01:00
"forks_count": 1,
"forks": 1,
2019-12-12 06:14:27 +01:00
"watchers": 1,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-09 16:30:32 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 177221305,
"name": "CVE-2017-5638",
"full_name": "colorblindpentester\/CVE-2017-5638",
2019-12-09 16:30:32 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "colorblindpentester",
"id": 45195264,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45195264?v=4",
"html_url": "https:\/\/github.com\/colorblindpentester"
2019-12-09 16:30:32 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2017-5638",
"description": "CVE-2017-5638 (PoC Exploits)",
2019-12-09 16:30:32 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-03-22T23:25:49Z",
"updated_at": "2019-03-22T23:30:08Z",
"pushed_at": "2019-03-22T23:29:23Z",
2019-12-09 16:30:32 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
2019-12-08 14:19:20 +01:00
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-27 06:17:04 +01:00
},
{
"id": 202619396,
"name": "cve-2017-5638",
"full_name": "injcristianrojas\/cve-2017-5638",
"owner": {
"login": "injcristianrojas",
"id": 862690,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/862690?v=4",
"html_url": "https:\/\/github.com\/injcristianrojas"
},
"html_url": "https:\/\/github.com\/injcristianrojas\/cve-2017-5638",
"description": "Demo app of THAT data broker's security breach",
"fork": false,
"created_at": "2019-08-15T22:27:23Z",
"updated_at": "2019-09-07T02:06:14Z",
2020-07-01 23:09:52 +02:00
"pushed_at": "2020-07-01T19:11:49Z",
2019-12-27 06:17:04 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-05-12 23:07:33 +02:00
},
{
"id": 263394878,
"name": "Aspire",
"full_name": "pasannirmana\/Aspire",
"owner": {
"login": "pasannirmana",
"id": 62306147,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62306147?v=4",
"html_url": "https:\/\/github.com\/pasannirmana"
},
"html_url": "https:\/\/github.com\/pasannirmana\/Aspire",
"description": "CVE-2017-5638",
"fork": false,
"created_at": "2020-05-12T16:42:51Z",
"updated_at": "2020-05-12T16:50:44Z",
"pushed_at": "2020-05-12T16:50:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]