PoC-in-GitHub/2017/CVE-2017-5638.json
2025-03-07 03:12:43 +09:00

662 lines
No EOL
23 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 84481525,
"name": "S2-045-EXP-POC-TOOLS",
"full_name": "jas502n\/S2-045-EXP-POC-TOOLS",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS",
"description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638",
"fork": false,
"created_at": "2017-03-09T19:40:47Z",
"updated_at": "2024-08-12T19:28:17Z",
"pushed_at": "2021-08-18T08:18:42Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
{
"id": 84518902,
"name": "strutszeiro",
"full_name": "mthbernardes\/strutszeiro",
"owner": {
"login": "mthbernardes",
"id": 12648924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12648924?v=4",
"html_url": "https:\/\/github.com\/mthbernardes",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro",
"description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-10T04:23:41Z",
"updated_at": "2024-08-12T19:28:17Z",
"pushed_at": "2021-08-16T13:58:19Z",
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 41,
"score": 0,
"subscribers_count": 6
},
{
"id": 84642680,
"name": "CVE-2017-5638",
"full_name": "jrrombaldo\/CVE-2017-5638",
"owner": {
"login": "jrrombaldo",
"id": 121948,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121948?v=4",
"html_url": "https:\/\/github.com\/jrrombaldo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-11T10:43:16Z",
"updated_at": "2024-03-29T16:06:15Z",
"pushed_at": "2024-03-29T16:06:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 84655941,
"name": "CVE-2017-5638_struts",
"full_name": "initconf\/CVE-2017-5638_struts",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/initconf\/CVE-2017-5638_struts",
"description": "detection for Apache Struts recon and compromise ",
"fork": false,
"created_at": "2017-03-11T14:30:02Z",
"updated_at": "2020-04-13T02:20:20Z",
"pushed_at": "2017-09-15T22:34:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 4
},
{
"id": 84693026,
"name": "struts-pwn",
"full_name": "mazen160\/struts-pwn",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn",
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2025-02-07T22:39:17Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 134,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve-2017-5638",
"exploit",
"struts",
"struts-pwn"
],
"visibility": "public",
"forks": 134,
"watchers": 429,
"score": 0,
"subscribers_count": 22
},
{
"id": 85664016,
"name": "st2-046-poc",
"full_name": "jas502n\/st2-046-poc",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/st2-046-poc",
"description": "st2-046-poc CVE-2017-5638",
"fork": false,
"created_at": "2017-03-21T05:47:49Z",
"updated_at": "2024-12-30T18:01:01Z",
"pushed_at": "2018-08-17T05:15:41Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},
{
"id": 87695524,
"name": "strutsy",
"full_name": "tahmed11\/strutsy",
"owner": {
"login": "tahmed11",
"id": 25324534,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25324534?v=4",
"html_url": "https:\/\/github.com\/tahmed11",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tahmed11\/strutsy",
"description": "Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability",
"fork": false,
"created_at": "2017-04-09T08:57:08Z",
"updated_at": "2024-08-12T19:28:58Z",
"pushed_at": "2018-09-01T10:15:30Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 92638419,
"name": "Stutsfi",
"full_name": "SpiderMate\/Stutsfi",
"owner": {
"login": "SpiderMate",
"id": 26036081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26036081?v=4",
"html_url": "https:\/\/github.com\/SpiderMate",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SpiderMate\/Stutsfi",
"description": "An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2",
"fork": false,
"created_at": "2017-05-28T03:48:10Z",
"updated_at": "2020-08-10T00:48:43Z",
"pushed_at": "2018-01-13T04:19:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 95873695,
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"full_name": "sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:40:31Z",
"updated_at": "2024-08-12T19:30:59Z",
"pushed_at": "2017-06-30T09:41:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 95874930,
"name": "Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"full_name": "sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:55:41Z",
"updated_at": "2024-08-12T19:30:59Z",
"pushed_at": "2017-06-30T09:57:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 13,
"score": 0,
"subscribers_count": 0
},
{
"id": 98150795,
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"owner": {
"login": "R4v3nBl4ck",
"id": 30399308,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30399308?v=4",
"html_url": "https:\/\/github.com\/R4v3nBl4ck",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"description": "Exploit created by: R4v3nBl4ck end Pacman",
"fork": false,
"created_at": "2017-07-24T05:05:28Z",
"updated_at": "2024-08-12T19:31:31Z",
"pushed_at": "2017-07-24T23:55:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 100141854,
"name": "CVE-2017-5638",
"full_name": "Xhendos\/CVE-2017-5638",
"owner": {
"login": "Xhendos",
"id": 16403693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16403693?v=4",
"html_url": "https:\/\/github.com\/Xhendos",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-08-12T23:00:14Z",
"updated_at": "2017-08-12T23:04:13Z",
"pushed_at": "2017-08-26T17:32:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 101267457,
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"owner": {
"login": "TamiiLambrado",
"id": 23249848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23249848?v=4",
"html_url": "https:\/\/github.com\/TamiiLambrado",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"description": null,
"fork": false,
"created_at": "2017-08-24T07:36:14Z",
"updated_at": "2017-08-24T07:36:14Z",
"pushed_at": "2017-08-24T07:36:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 104686879,
"name": "strutser",
"full_name": "invisiblethreat\/strutser",
"owner": {
"login": "invisiblethreat",
"id": 2525006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2525006?v=4",
"html_url": "https:\/\/github.com\/invisiblethreat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/invisiblethreat\/strutser",
"description": "Check for Struts Vulnerability CVE-2017-5638",
"fork": false,
"created_at": "2017-09-25T00:40:57Z",
"updated_at": "2019-06-11T14:15:40Z",
"pushed_at": "2017-09-28T21:10:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2017-5638",
"struts"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 105124155,
"name": "CVE-2017-5638",
"full_name": "lizhi16\/CVE-2017-5638",
"owner": {
"login": "lizhi16",
"id": 22630810,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22630810?v=4",
"html_url": "https:\/\/github.com\/lizhi16",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lizhi16\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-09-28T08:43:21Z",
"updated_at": "2024-09-16T14:01:51Z",
"pushed_at": "2018-03-25T02:49:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 107489354,
"name": "Apache-Struts",
"full_name": "c002\/Apache-Struts",
"owner": {
"login": "c002",
"id": 26592580,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26592580?v=4",
"html_url": "https:\/\/github.com\/c002",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
"description": " An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-10-19T02:40:45Z",
"updated_at": "2020-05-17T04:32:06Z",
"pushed_at": "2017-05-28T14:03:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 108805305,
"name": "Common-Vulnerability-and-Exploit",
"full_name": "donaldashdown\/Common-Vulnerability-and-Exploit",
"owner": {
"login": "donaldashdown",
"id": 24925373,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24925373?v=4",
"html_url": "https:\/\/github.com\/donaldashdown",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/donaldashdown\/Common-Vulnerability-and-Exploit",
"description": "This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.",
"fork": false,
"created_at": "2017-10-30T05:21:53Z",
"updated_at": "2023-09-18T14:46:19Z",
"pushed_at": "2017-11-11T23:32:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 639166342,
"name": "CVE-2017-5638-ApacheStruts2.3.5",
"full_name": "FredBrave\/CVE-2017-5638-ApacheStruts2.3.5",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2017-5638-ApacheStruts2.3.5",
"description": "A exploit for CVE-2017-5638. This exploit works on versions 2.3.5-2.3.31 and 2.5 2.5.10",
"fork": false,
"created_at": "2023-05-10T22:48:58Z",
"updated_at": "2023-05-10T23:10:04Z",
"pushed_at": "2023-05-10T23:10:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 827395652,
"name": "web-application-firewall-",
"full_name": "Nithylesh\/web-application-firewall-",
"owner": {
"login": "Nithylesh",
"id": 92871492,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92871492?v=4",
"html_url": "https:\/\/github.com\/Nithylesh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nithylesh\/web-application-firewall-",
"description": "This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).",
"fork": false,
"created_at": "2024-07-11T15:16:56Z",
"updated_at": "2025-01-08T04:59:31Z",
"pushed_at": "2024-07-11T15:19:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 852437483,
"name": "CVE-2017-5638-PoC",
"full_name": "kloutkake\/CVE-2017-5638-PoC",
"owner": {
"login": "kloutkake",
"id": 112651256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112651256?v=4",
"html_url": "https:\/\/github.com\/kloutkake",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kloutkake\/CVE-2017-5638-PoC",
"description": "This repository provides a PoC for CVE-2017-5638, a remote code execution vulnerability in Apache Struts 2, exploitable via a crafted Content-Type HTTP header.",
"fork": false,
"created_at": "2024-09-04T19:59:29Z",
"updated_at": "2025-01-31T21:15:12Z",
"pushed_at": "2024-09-12T01:40:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 900400961,
"name": "CVE-2017-5638-POC",
"full_name": "Xernary\/CVE-2017-5638-POC",
"owner": {
"login": "Xernary",
"id": 75204222,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75204222?v=4",
"html_url": "https:\/\/github.com\/Xernary",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Xernary\/CVE-2017-5638-POC",
"description": "Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server",
"fork": false,
"created_at": "2024-12-08T17:22:38Z",
"updated_at": "2025-02-06T19:12:17Z",
"pushed_at": "2025-02-06T19:12:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]