CVE-2017-9805

HIGH KEV RANSOMWARE NUCLEI

Apache Struts 2 REST Plugin XStream RCE

Title source: metasploit

Description

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

Exploits (27)

github WRITEUP 3,480 stars
by qazbnm456 · poc
https://github.com/qazbnm456/awesome-cve-poc/tree/master/CVE-2017-9805.md
nomisec WORKING POC 248 stars
by mazen160 · remote
https://github.com/mazen160/struts-pwn_CVE-2017-9805
nomisec WORKING POC 60 stars
by luc10 · remote
https://github.com/luc10/struts-rce-cve-2017-9805
nomisec WORKING POC 20 stars
by chrisjd20 · remote
https://github.com/chrisjd20/cve-2017-9805.py
nomisec WORKING POC 15 stars
by 0x00-0x00 · remote
https://github.com/0x00-0x00/-CVE-2017-9805
github WRITEUP 14 stars
by xbl3 · poc
https://github.com/xbl3/awesome-cve-poc_qazbnm456/tree/master/CVE-2017-9805.md
nomisec WORKING POC 5 stars
by Lone-Ranger · remote
https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805
nomisec WORKING POC 3 stars
by hahwul · remote
https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby
nomisec WORKING POC 3 stars
by Shakun8 · remote
https://github.com/Shakun8/CVE-2017-9805
nomisec WORKING POC 1 stars
by jongmartinez · local
https://github.com/jongmartinez/-CVE-2017-9805-
nomisec WORKING POC 1 stars
by BeyondCy · remote
https://github.com/BeyondCy/S2-052
nomisec WORKING POC 1 stars
by 0xd3vil · remote
https://github.com/0xd3vil/CVE-2017-9805-Exploit
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2017-9805
nomisec SCANNER 1 stars
by UbuntuStrike · infoleak
https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-
nomisec WORKING POC
by rvermeulen · poc
https://github.com/rvermeulen/apache-struts-cve-2017-9805
nomisec WORKING POC
by wifido · local
https://github.com/wifido/CVE-2017-9805-Exploit
nomisec WORKING POC
by z3bd · remote
https://github.com/z3bd/CVE-2017-9805
nomisec WRITEUP
by Fl5xia · poc
https://github.com/Fl5xia/CVE-2017-9805
nomisec WRITEUP
by AvishkaSenadheera · poc
https://github.com/AvishkaSenadheera/CVE-2017-9805---Documentation---IT19143378
nomisec SCANNER
by UbuntuStrike · remote
https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit
nomisec WORKING POC
by NoSpaceAvailable · poc
https://github.com/NoSpaceAvailable/CVE-2017-9805_example_build
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2017-9805
nomisec WORKING POC
by 7s26simon · poc
https://github.com/7s26simon/CVE-2017-9805-S2-052
exploitdb WORKING POC
by Warflop · pythonremotelinux
https://www.exploit-db.com/exploits/42627
metasploit WORKING POC EXCELLENT
by Man Yue Mo, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts2_rest_xstream.rb

Nuclei Templates (1)

Apache Struts2 S2-052 - Remote Code Execution
HIGHby pikpikcu
Shodan: http.html:"apache struts" || http.title:"struts2 showcase" || http.html:"struts problem report"
FOFA: body="struts problem report" || title="struts2 showcase" || body="apache struts"

Scores

CVSS v3 8.1
EPSS 0.9432
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2021-11-03
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2018-0602
Ransomware Use Confirmed

Classification

CWE
CWE-502
Status draft

Affected Products (12)

apache/struts < 2.3.34
cisco/digital_media_manager
cisco/hosted_collaboration_solution
cisco/hosted_collaboration_solution
cisco/hosted_collaboration_solution
cisco/hosted_collaboration_solution
cisco/media_experience_engine
cisco/media_experience_engine
cisco/network_performance_analysis
cisco/video_distribution_suite_for_internet_streaming
netapp/oncommand_balance
org.apache.struts/struts2-rest-plugin < 2.3.34Maven

Timeline

Published Sep 15, 2017
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026