mazen160/struts-pwn

error 104 - Connection reset by peer

benze opened this issue · 1 comments

benze commented

Strangely enough, if I run the python script with --check, I get a response 200 and it shows my site as vulnerable.

If I try to run the exploit, then I get an Exception:
EXCEPTION::::--> ('Connection aborted.', error(104, 'Connection reset by peer'))

Any ideas what I can do to debug where/why the exception is being generated with the exploitable content-type?

Based on this, it seems that the target you are testing is behind a WAF that has a rule against the Struts RCE payload used in struts-pwn.

The target seems vulnerable, but the WAF is blocking exploiting attempts when using the payload.