logo
DATABASE RESOURCES PRICING ABOUT US

http-vuln-cve2017-5638 NSE Script

Description

Detects whether the specified URL is vulnerable to the Apache Struts Remote Code Execution Vulnerability (CVE-2017-5638). ## Script Arguments #### http-vuln-cve2017-5638.path The URL path to request. The default path is "/". #### http-vuln-cve2017-5638.method The HTTP method for the request. The default method is "GET". #### slaxml.debug See the documentation for the [slaxml](<../lib/slaxml.html#script-args>) library. #### http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent See the documentation for the [http](<../lib/http.html#script-args>) library. #### smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername See the documentation for the [smbauth](<../lib/smbauth.html#script-args>) library. #### vulns.short, vulns.showall See the documentation for the [vulns](<../lib/vulns.html#script-args>) library. ## Example Usage nmap -p <port> --script http-vuln-cve2017-5638 <target> ## Script Output PORT STATE SERVICE 80/tcp open http | http-vuln-cve2017-5638: | VULNERABLE | Apache Struts Remote Code Execution Vulnerability | State: VULNERABLE | IDs: CVE:CVE-2017-5638 | | Disclosure date: 2017-03-07 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638 | https://cwiki.apache.org/confluence/display/WW/S2-045 |_ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html ## Requires * [http](<../lib/http.html>) * [shortport](<../lib/shortport.html>) * [vulns](<../lib/vulns.html>) * [stdnse](<../lib/stdnse.html>) * [string](<>) * [rand](<../lib/rand.html>) * * *


Related