【正文】
(asdf)((‘(1)’)(u0023rtu003dgetRuntime()))=1Fixing CVE20101870Struts2 users must upgrade to the , which whitelists a set of characters that excludes characters required to exploit this vulnerability.In cases where upgrade isn’t possible you can use ParameterInterceptor’s “excludeParams” parameter to whitelist the characters required for your application to operate correctly(usually Az09_.’”[]) alternatively you can blacklist () which are the characters required to exploit this bug.[+]Reference:~~~~~~~~~~10 / 10。yMethodExecution39。]‘)(meh)=trueamp。remote mand execution[+]poc:~~~~~~~~~Actual proof of concept had to use OGNL’s expression evaluation when crafting HTTP request. PoC for this bug will be published on July 12 2010. To test whether your application is vulnerable you can use the following proof of concept, which will call ().exit(1):://mydomain/?(‘u0023_memberAccess[39。[+]info:~~~~~~~~~Friday, July 9, 2010CVE20101870:其目的是:創(chuàng)建一個泛化的、可重用且可擴(kuò)展的命令模式框架,而不是一個特定在某個領(lǐng)域使用的框架。XWork是一個標(biāo)準(zhǔn)的Command模 式實(shí)現(xiàn),并且完全從 web層脫離出來。WebWork是由OpenSymphony組織開發(fā)的,致力于組件化和代碼重用的拉出式MVC模式J2EE Web框架。一旦Action執(zhí)行完畢。/classname==checkboxinterceptor/classname==workflowinterceptor/classname==tokensessioninterceptor/classname==timerinterceptor/classname==servletconfiginterceptor/classname==s