Script http-vuln-cve2017-5638
Script types:
portrule
Categories:
vuln
Download: https://svn.nmap.org/nmap/scripts/http-vuln-cve2017-5638.nse
Script Summary
Detects whether the specified URL is vulnerable to the Apache Struts Remote Code Execution Vulnerability (CVE-2017-5638).
Script Arguments
- http-vuln-cve2017-5638.path
The URL path to request. The default path is "/".
- http-vuln-cve2017-5638.method
The HTTP method for the request. The default method is "GET".
- slaxml.debug
See the documentation for the slaxml library.
- http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent
See the documentation for the http library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
- vulns.short, vulns.showall
See the documentation for the vulns library.
Example Usage
nmap -p <port> --script http-vuln-cve2017-5638 <target>
Script Output
PORT STATE SERVICE 80/tcp open http | http-vuln-cve2017-5638: | VULNERABLE | Apache Struts Remote Code Execution Vulnerability | State: VULNERABLE | IDs: CVE:CVE-2017-5638 | | Disclosure date: 2017-03-07 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638 | https://cwiki.apache.org/confluence/display/WW/S2-045 |_ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html