Tagged articles
5 articles
Page 1 of 1
Java Captain
Java Captain
Jun 15, 2018 · Backend Development

Comparison of Struts2 and SpringMVC: Architectural and Functional Differences

The article provides a detailed comparison between Struts2 and SpringMVC, highlighting differences in request handling, interceptor mechanisms, memory usage, configuration complexity, Ajax integration, validation support, seamless Spring integration, design philosophy, development efficiency, performance, and configuration requirements.

BackendMVCSpringMVC
0 likes · 4 min read
Comparison of Struts2 and SpringMVC: Architectural and Functional Differences
MaGe Linux Operations
MaGe Linux Operations
Sep 21, 2017 · Information Security

How a Struts2 RCE Vulnerability Turned My Linux Server into a Bitcoin Miner

A Linux server behind multiple firewalls was compromised by a Struts2 remote code execution flaw (CVE‑2017‑5638), leading to a hidden cron job that repeatedly launched a Bitcoin mining script, illustrating how outdated frameworks can expose systems to stealthy resource‑draining attacks.

Bitcoin miningCVE-2017-5638Remote Code Execution
0 likes · 6 min read
How a Struts2 RCE Vulnerability Turned My Linux Server into a Bitcoin Miner
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2017 · Information Security

How We Detected and Eliminated a Struts2 Mining Malware Attack

This article recounts a recent incident where a Struts2 vulnerability was exploited to run mining malware, detailing the discovery process, forensic analysis of services, processes, network listeners, and the step‑by‑step remediation measures including script‑based scans, permission hardening, and upgrading Struts2.

Struts2Vulnerabilityincident response
0 likes · 4 min read
How We Detected and Eliminated a Struts2 Mining Malware Attack
Tencent Cloud Developer
Tencent Cloud Developer
Mar 10, 2017 · Information Security

Automated Exploitation of Common Vulnerabilities: MongoDB Ransomware, Struts2, Redis, and ElasticSearch Cases

The article shows how attackers automate mass exploitation of widely‑known flaws—scanning the Internet for open MongoDB, Redis, ElasticSearch or Struts2 services, using unauthenticated access or public PoCs to encrypt data, execute code, or build botnets, and stresses that timely patching and secure defaults are essential to stop such N‑day attacks.

ElasticsearchMongoDBStruts2
0 likes · 11 min read
Automated Exploitation of Common Vulnerabilities: MongoDB Ransomware, Struts2, Redis, and ElasticSearch Cases