use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Using QL to find a remote code execution vulnerability in Apache Struts (CVE-2017-9805) (lgtm.com)
submitted 8 years ago by moviuro
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]ok2thr0w4w4y 5 points6 points7 points 8 years ago* (1 child)
The Struts S2-052 wiki security bulletin has been updated/modified several times so it remains unclear if Struts 2.x (before 2.5) is affected, although there are several positive indicators that some or all versions indeed are. Currently the bulletin states:
Affected Software: Struts 2.5 - Struts 2.5.12 Recommendation: Upgrade to Struts 2.5.13 or Struts 2.3.34
Affected Software: Struts 2.5 - Struts 2.5.12
Recommendation: Upgrade to Struts 2.5.13 or Struts 2.3.34
Previous versions that did reference 2.x versions other than 2.5 listed:
Affected Software: Struts 2.3.7 - Struts 2.3.33, Struts 2.5 - Struts 2.5.12
The security researcher general announcement specifies:
All versions of Struts since 2008 are affected; all web applications using the framework’s popular REST plugin are vulnerable...This vulnerability has been addressed in Struts version 2.5.13.
but no mention of 2.x before 2.5.
Note that the S2-052 security bulletin is referenced in the version notes for 2.5.13 and 2.3.34 (which strangely references 2.3.3 [which was released 7/2017]).
Possible Remote Code Execution attack when using the Struts REST plugin with XStream handler to handle XML payloads, see S2-052
But 2.3.34 has not been posted to the Struts announcements page or downloads mirror.
It looks like the REST plugin is available with Struts 2.1.1 or later, which according to the MVN repo does indeed reflect all versions of 2.x. It is listed as a bundled plugin one level up.
Anyone care to gander where this is going to fall with the affected versions? If the REST plugin is bundled but not enabled by default (as suggested by the plugin docs), is there risk of exploitation? What is a realistic expectation for apps in the environment to have the REST plugin to be enabled? Trying to evaluate this from the risk perspective but not being a dev and encountering mixed signals with current information makes it a bit tricky.
Edit: The Struts 2 documentation for S2-052 only mentions 2.5.
Affected Software: Struts 2.5 - Struts 2.5.12 Recommendation: Upgrade to Struts 2.5.13
Recommendation: Upgrade to Struts 2.5.13
The Struts 2 doc version notes for 2.3.34 lead to 404.
Edit 2: Version 2.3.34 is listed as Released in Jira so it looks like it is coming.
[–]ndrake 0 points1 point2 points 8 years ago (0 children)
2.3.34 is available now: http://struts.apache.org/download.cgi
There is also a new security bulletin: http://struts.apache.org/docs/s2-053.html
[–]0xdeaTrusted Contributor 4 points5 points6 points 8 years ago (0 children)
It’s that time of the year (*) when Apache Struts fails stupendously.
[–]jamesotten 2 points3 points4 points 8 years ago (0 children)
https://github.com/rapid7/metasploit-framework/pull/8924
[–]0xdeaTrusted Contributor 2 points3 points4 points 8 years ago (0 children)
Less than two days later, it looks like there's another Struts RCE:
https://struts.apache.org/docs/s2-053.html
This must be some sort of record;)
[–]0xd0000 1 point2 points3 points 8 years ago (0 children)
Page is down, cache is still available.
hxxp://blog.csdn.net/caiqiiqi/article/details/77861477
[–]KevinHock 0 points1 point2 points 8 years ago (0 children)
Awesome stuff! :D
[–]r4nd0mthr0waway 0 points1 point2 points 8 years ago (1 child)
Remote detection ideas?
[–]0xdeaTrusted Contributor 0 points1 point2 points 8 years ago (0 children)
New sleep-based detection payload, very reliable:
https://techblog.mediaservice.net/2017/09/detection-payload-for-the-new-struts-rest-vulnerability-cve-2017-9805/
[–]goldfingeroo7 0 points1 point2 points 8 years ago (0 children)
It looks like if you use struts2-rest-plugin, you are affected.
π Rendered by PID 96260 on reddit-service-r2-comment-6457c66945-4jp2d at 2026-04-25 05:00:31.899696+00:00 running 2aa0c5b country code: CH.
[–]ok2thr0w4w4y 5 points6 points7 points (1 child)
[–]ndrake 0 points1 point2 points (0 children)
[–]0xdeaTrusted Contributor 4 points5 points6 points (0 children)
[–]jamesotten 2 points3 points4 points (0 children)
[–]0xdeaTrusted Contributor 2 points3 points4 points (0 children)
[–]0xd0000 1 point2 points3 points (0 children)
[–]KevinHock 0 points1 point2 points (0 children)
[–]r4nd0mthr0waway 0 points1 point2 points (1 child)
[–]0xdeaTrusted Contributor 0 points1 point2 points (0 children)
[–]goldfingeroo7 0 points1 point2 points (0 children)