Vulnerabilites related to apache - struts
Vulnerability from fkie_nvd
Published
2017-09-20 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "8E5068CA-A472-47D2-A89F-A43EA8617874", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "E17D62B8-349B-4F30-8849-6912828802C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "D5E91133-D585-43F7-9093-94D735B3167E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "DD44FD72-ECE7-4E08-AD9E-5CE2C310C2C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "725DBE04-720B-421E-B76A-4EE92FEE171C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F36F794-B949-40DB-986A-EDB0E6619100", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672." }, { "lang": "es", "value": "En Apache Struts desde la versi\u00f3n 2.3.7 hasta la 2.3.33 y desde la 2.5 hasta la 2.5.12, si una aplicaci\u00f3n permite la introducci\u00f3n de una URL en un campo de un formulario y se emplea URLValidator (integrado), es posible preparar una URL especial que ser\u00e1 usada para sobrecargar el proceso del servidor cuando se lleva a cabo la validaci\u00f3n de la URL. NOTA: Esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para S2-047 / CVE-2017-7672." } ], "id": "CVE-2017-9804", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-20T17:29:00.620", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100612" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039261" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-050.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-050.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-07 04:09
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1B3872B7-2972-433D-96A1-154FA545B311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Apache Struts v1.3.10 permiten a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) el par\u00e1metro \u0027name\u0027 de struts-examples/upload/upload-submit.do, o el par\u00e1metro \u0027message\u0027 de (2) struts-cookbook/processSimple.do o (3) struts-cookbook/processDyna.do." } ], "id": "CVE-2012-1007", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-02-07T04:09:20.360", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "source": "cve@mitre.org", "url": "http://secpod.org/blog/?p=450" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51900" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secpod.org/blog/?p=450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-29 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
Apache Struts 2.x before 2.3.24.1 allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/82550 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1033908 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20180629-0002/ | ||
secalert@redhat.com | https://struts.apache.org/docs/s2-026.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/82550 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033908 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180629-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://struts.apache.org/docs/s2-026.html | Mitigation, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "84408BC6-E785-4874-9409-AC02AF0A7897", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "79E08D3E-9F86-4E9D-B1BF-EBEA8AB3BEE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.24.1 allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object." }, { "lang": "es", "value": "Apache Struts en versiones 2.x anteriores a la 2.3.24.1 permite que los atacantes remotos manipulen estados internos de Struts o alteren la configuraci\u00f3n del contenedor mediante vectores que involucren un objeto de la cima." } ], "id": "CVE-2015-5209", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-29T15:29:00.393", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/82550" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033908" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20180629-0002/" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/82550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-026.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-20 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.3.20 | |
apache | struts | 2.3.20.1 | |
apache | struts | 2.3.20.2 | |
apache | struts | 2.3.20.3 | |
apache | struts | 2.3.21 | |
apache | struts | 2.3.22 | |
apache | struts | 2.3.23 | |
apache | struts | 2.3.24 | |
apache | struts | 2.3.24.1 | |
apache | struts | 2.3.24.2 | |
apache | struts | 2.3.24.3 | |
apache | struts | 2.3.25 | |
apache | struts | 2.3.26 | |
apache | struts | 2.3.27 | |
apache | struts | 2.3.28 | |
apache | struts | 2.3.28.1 | |
apache | struts | 2.3.29 | |
apache | struts | 2.3.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side." }, { "lang": "es", "value": "En el plugin Convention en Apache Struts versiones 2.3.x anteriores a 2.3.31, y versiones 2.5.x anteriores a 2.5.5, es posible preparar una URL especial que ser\u00e1 usada para el salto de ruta (path) y una ejecuci\u00f3n de c\u00f3digo arbitrario en el lado del servidor." } ], "id": "CVE-2016-6795", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-20T17:29:00.277", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93773" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-042.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-12 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://struts.apache.org/docs/s2-029.html | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/85066 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1035271 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/docs/s2-029.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85066 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035271 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "E91EA77A-D1B9-4E09-9FE8-F32C359F15DA", "versionEndExcluding": "2.3.20.3", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EE3EE6E-6B35-4429-8FED-06DE0DCA42E0", "versionEndIncluding": "2.3.24.1", "versionStartIncluding": "2.3.21", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation." }, { "lang": "es", "value": "Apache Struts 2.x en versiones anteriores a 2.3.28 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una secuencia \"%{}\" en un atributo de etiqueta, tambi\u00e9n conocido como evaluaci\u00f3n OGNL doble forzada." } ], "id": "CVE-2016-0785", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-12T16:59:00.123", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-029.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85066" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035271" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | banking_platform | 2.3.0 | |
oracle | banking_platform | 2.4.0 | |
oracle | banking_platform | 2.4.1 | |
oracle | banking_platform | 2.5.0 | |
oracle | portal | 11.1.1.6 | |
apache | struts | 1.0 | |
apache | struts | 1.0 | |
apache | struts | 1.0 | |
apache | struts | 1.0 | |
apache | struts | 1.0.1 | |
apache | struts | 1.0.2 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.2.0 | |
apache | struts | 1.2.1 | |
apache | struts | 1.2.2 | |
apache | struts | 1.2.3 | |
apache | struts | 1.2.4 | |
apache | struts | 1.2.5 | |
apache | struts | 1.2.6 | |
apache | struts | 1.2.7 | |
apache | struts | 1.2.8 | |
apache | struts | 1.2.9 | |
apache | struts | 1.3.5 | |
apache | struts | 1.3.6 | |
apache | struts | 1.3.7 | |
apache | struts | 1.3.8 | |
apache | struts | 1.3.9 | |
apache | struts | 1.3.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:banking_platform:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "653CDB2C-E0B6-4BEF-A725-3C74BFC2BA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2BEE49E-A5AA-42D3-B422-460454505480", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F4FF66F7-10C8-4A1C-910A-EF7D12A4284C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "35AD0C07-9688-4397-8D45-FBB88C0F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:portal:11.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "DE543F18-45AE-4C8B-A953-0CC7C0F10461", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5051228-446E-461D-9B5F-8F765C7BA57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "32FFABC1-74F8-414A-BCC7-7CDC7EB078F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "1239ED60-1581-4FFB-A5FB-4FB898C1EBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "08266BA4-A365-4187-AC98-230E040B3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "709E6CEB-461C-4C6C-A3E9-CC37E3AE9E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*", "matchCriteriaId": "93FA9AE3-B453-4FE6-82A9-7DDEF3F6C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*", "matchCriteriaId": "A3BB6FBE-469B-4920-A30B-33AD9E41ACCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*", "matchCriteriaId": "34FC82D3-CCAF-4F37-B531-2A9CA17311A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "E0B8B413-8C62-44B6-A382-26F35F4573D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "6309C679-890A-4214-8857-9F119CBBAA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "241A8B39-643B-4371-B629-1636F24DDC97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EE7EF4C-CD6F-4B74-89E3-321706B733FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD882860-03D0-49E9-8CED-DE6663392548", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "95087298-38D2-4ED6-9D99-494AE90F6DE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "15BD4B0B-31A2-4DA3-814A-5C959D1BC64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B2ECF5E1-457F-4E76-81F7-65114DC4E1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C34FDB0-2778-4C36-8345-F7E27509A383", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF0302D3-CB8D-4FA7-8F07-C2C7593877BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8FC3685E-CC47-479D-A418-065ADB38EDD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "805A4E32-2447-49BB-8631-E41DAA221E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "03906D34-F3B3-4C56-A6A6-2F7A10168501", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "91CBFC67-BDD8-4579-843A-F93A2661B032", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1B3872B7-2972-433D-96A1-154FA545B311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899." }, { "lang": "es", "value": "ActionServlet.java en Apache Struts 1 1.x hasta la versi\u00f3n 1.3.10 no maneja adecuadamente accesos multihilo para una instancia ActionForm, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (acceso inesperado a memoria) a trav\u00e9s de una solicitud multiparte, un problema relacionado con CVE-2015-0899." } ], "id": "CVE-2016-1181", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:01.617", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN03188560/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91068" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036056" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1181" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN03188560/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 1.0 | |
apache | struts | 1.0.2 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.2.2 | |
apache | struts | 1.2.4 | |
apache | struts | 1.2.6 | |
apache | struts | 1.2.7 | |
apache | struts | 1.2.8 | |
apache | struts | 1.2.9 | |
apache | struts | 1.3.5 | |
apache | struts | 1.3.8 | |
apache | struts | 1.3.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5051228-446E-461D-9B5F-8F765C7BA57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*", "matchCriteriaId": "93FA9AE3-B453-4FE6-82A9-7DDEF3F6C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*", "matchCriteriaId": "A3BB6FBE-469B-4920-A30B-33AD9E41ACCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*", "matchCriteriaId": "34FC82D3-CCAF-4F37-B531-2A9CA17311A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "E0B8B413-8C62-44B6-A382-26F35F4573D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "6309C679-890A-4214-8857-9F119CBBAA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD882860-03D0-49E9-8CED-DE6663392548", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B2ECF5E1-457F-4E76-81F7-65114DC4E1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C34FDB0-2778-4C36-8345-F7E27509A383", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF0302D3-CB8D-4FA7-8F07-C2C7593877BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "03906D34-F3B3-4C56-A6A6-2F7A10168501", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1B3872B7-2972-433D-96A1-154FA545B311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter." }, { "lang": "es", "value": "La implementaci\u00f3n MultiPageValidator en Apache Struts 1 1.1 hasta la versi\u00f3n 1.3.10 permite a atacantes remotos eludir las restricciones destinadas al acceso a trav\u00e9s de un par\u00e1metro page modificado." } ], "id": "CVE-2015-0899", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:00.147", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN86448949/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042" }, { "source": "vultures@jpcert.or.jp", "url": "http://www.debian.org/security/2016/dsa-3536" }, { "source": "vultures@jpcert.or.jp", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://www.securityfocus.com/bid/74423" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN" }, { "source": "vultures@jpcert.or.jp", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN86448949/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-07 09:15
Modified
2025-02-13 18:15
Severity ?
Summary
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html | Third Party Advisory, VDB Entry | |
security@apache.org | https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj | Mailing List, Patch | |
security@apache.org | https://security.netapp.com/advisory/ntap-20231214-0010/ | Third Party Advisory, VDB Entry | |
security@apache.org | https://www.openwall.com/lists/oss-security/2023/12/07/1 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj | Mailing List, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20231214-0010/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2023/12/07/1 | Mailing List |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE174994-63BE-4A3F-A986-7903868FCE23", "versionEndExcluding": "2.5.33", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBE0443B-320B-4C29-83DC-624546AEE6D5", "versionEndExcluding": "6.3.0.2", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\nUsers are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to\u00a0fix this issue." }, { "lang": "es", "value": "Un atacante puede manipular los par\u00e1metros de carga de archivos para permitir path traversal y, en algunas circunstancias, esto puede provocar la carga de un archivo malicioso que puede usarse para realizar la ejecuci\u00f3n remota de c\u00f3digo. Se recomienda a los usuarios actualizar a las versiones Struts 2.5.33 o Struts 6.3.0.1 o superior para solucionar este problema." } ], "id": "CVE-2023-50164", "lastModified": "2025-02-13T18:15:49.103", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-07T09:15:07.060", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch" ], "url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.netapp.com/advisory/ntap-20231214-0010/" }, { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "https://www.openwall.com/lists/oss-security/2023/12/07/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch" ], "url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.netapp.com/advisory/ntap-20231214-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://www.openwall.com/lists/oss-security/2023/12/07/1" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "security@apache.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-01 14:15
Modified
2024-11-21 01:31
Severity ?
Summary
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
redhat | jboss_enterprise_web_server | 1.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F69A799-B8E9-434A-B0E9-2BF17E857140", "versionEndExcluding": "2.3.1.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "14259BF1-3601-4BF1-A591-FC4DE1639C57", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands." }, { "lang": "es", "value": "Apache Struts versiones anteriores a 2.3.1.2, permite a atacantes remotos omitir las protecciones de seguridad en la clase ParameterInterceptor y ejecutar comandos arbitrarios." } ], "id": "CVE-2011-3923", "lastModified": "2024-11-21T01:31:32.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-01T14:15:10.877", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://seclists.org/fulldisclosure/2014/Jul/38" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.exploit-db.com/exploits/24874" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/51628" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id?1026575" }, { "source": "chrome-cve-admin@google.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923" }, { "source": "chrome-cve-admin@google.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72585" }, { "source": "chrome-cve-admin@google.com", "url": "https://security-tracker.debian.org/tracker/CVE-2011-3923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Jul/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/24874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51628" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security-tracker.debian.org/tracker/CVE-2011-3923" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-30 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 | |
apache | struts | 2.2.1 | |
apache | struts | 2.2.1.1 | |
apache | struts | 2.2.3 | |
apache | struts | 2.2.3.1 | |
apache | struts | 2.3.1 | |
apache | struts | 2.3.1.1 | |
apache | struts | 2.3.1.2 | |
apache | struts | 2.3.3 | |
apache | struts | 2.3.4 | |
apache | struts | 2.3.4.1 | |
apache | struts | 2.3.7 | |
apache | struts | 2.3.8 | |
apache | struts | 2.3.12 | |
apache | struts | 2.3.14 | |
apache | struts | 2.3.14.1 | |
apache | struts | 2.3.14.2 | |
apache | struts | 2.3.14.3 | |
apache | struts | 2.3.15 | |
apache | struts | 2.3.15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix." }, { "lang": "es", "value": "Apache Struts v2.0.0 hasta v2.3.15.1 permite a atacantes remotos evitar los controles de acceso a trav\u00e9s de una acci\u00f3n manipulada: prefix." } ], "id": "CVE-2013-4310", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-30T21:55:09.487", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0083.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54919" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/56483" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/56492" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-018.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1029077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/56492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029077" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-14 08:15
Modified
2025-02-13 17:16
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "D75F74D6-E223-41BA-86B4-5BADF2B48692", "versionEndExcluding": "2.5.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "158CD586-162F-41A6-97B5-62D5F59B656E", "versionEndExcluding": "6.1.2.1", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.\n\nUpgrade to Struts 2.5.31 or 6.1.2.1 or greater." } ], "id": "CVE-2023-34149", "lastModified": "2025-02-13T17:16:34.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@apache.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-14T08:15:09.450", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/14/2" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-063" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/14/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "security@apache.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-16 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/91277 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20180629-0004/ | Third Party Advisory | |
secalert@redhat.com | https://struts.apache.org/docs/s2-036.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91277 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180629-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://struts.apache.org/docs/s2-036.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
netapp | oncommand_balance | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ACAEB91-DA7D-4919-970A-235B20A5B750", "versionEndExcluding": "2.3.29", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785." }, { "lang": "es", "value": "Apache Struts en versiones 2.x anteriores a la 2.3.29 permite que atacantes remotos ejecuten c\u00f3digo arbitrario mediante una secuencia \"%{}\" en un atributo de etiqueta. Esto tambi\u00e9n se conoce como evaluaci\u00f3n OGNL doble forzada. NOTA: Esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2016-0785." } ], "id": "CVE-2016-4461", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-16T16:29:00.607", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91277" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0004/" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-036.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-20 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "8E5068CA-A472-47D2-A89F-A43EA8617874", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "E17D62B8-349B-4F30-8849-6912828802C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "D5E91133-D585-43F7-9093-94D735B3167E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "DD44FD72-ECE7-4E08-AD9E-5CE2C310C2C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "725DBE04-720B-421E-B76A-4EE92FEE171C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "0F36F794-B949-40DB-986A-EDB0E6619100", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload." }, { "lang": "es", "value": "El Plugin REST en Apache Struts versiones 2.1.x, versiones 2.3.7 hasta 2.3.33 y versiones 2.5 hasta 2.5.12, est\u00e1 usando una biblioteca XStream obsoleta que es vulnerable y permite realizar un ataque de DoS usando una petici\u00f3n maliciosa con una carga \u00fatil XML especialmente dise\u00f1ada." } ], "id": "CVE-2017-9793", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-20T17:29:00.573", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100611" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039262" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-051.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-051.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-26 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:siebel_e-billing:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB16FA05-8486-4E04-9745-0EE28458FDA0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions." }, { "lang": "es", "value": "Apache Struts versiones 2.3.19 hasta 2.3.20.2, versiones 2.3.21 hasta 2.3.24.1 y versiones 2.3.25 hasta 2.3.28, cuando Dynamic Method Invocation est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio del prefijo method:, relacionado con expresiones encadenadas." } ], "id": "CVE-2016-3081", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-26T14:59:02.207", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html" }, { "source": "secalert@redhat.com", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160527-01-struts2-en" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/http/struts_dmi_exec" }, { "source": "secalert@redhat.com", "url": "http://www.rapid7.com/db/modules/exploit/multi/http/struts_dmi_exec" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/87327" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035665" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-032.html" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/39756/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160527-01-struts2-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/http/struts_dmi_exec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rapid7.com/db/modules/exploit/multi/http/struts_dmi_exec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/87327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/39756/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-30 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "4839E719-F3DA-4768-BB37-B575207BEC22", "versionEndIncluding": "1.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a \u0027org.apache.struts.taglib.html.Constants.CANCEL\u0027 parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check." } ], "id": "CVE-2006-1546", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-30T22:02:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38374" }, { "source": "secalert@redhat.com", "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/struts-dev/200601.mbox/%3cdr169r%24623%242%40sea.gmane.org%3e" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/struts-user/200601.mbox/%3c20060121221800.15814.qmail%40web32607.mail.mud.yahoo.com%3e" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/19493" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20117" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1015856" }, { "source": "secalert@redhat.com", "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/17342" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/struts-dev/200601.mbox/%3cdr169r%24623%242%40sea.gmane.org%3e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/struts-user/200601.mbox/%3c20060121221800.15814.qmail%40web32607.mail.mud.yahoo.com%3e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25612" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-05 09:15
Modified
2025-05-28 16:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied.
Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft | Mailing List, Release Notes | |
security@apache.org | https://www.openwall.com/lists/oss-security/2023/12/09/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft | Mailing List, Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2023/12/09/1 | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9AB79F4-6FCB-42EC-B241-099B97CC99ED", "versionEndExcluding": "2.5.32", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "97723A4F-E3A6-4AF3-ACC9-3C9618A75220", "versionEndExcluding": "6.3.0.1", "versionStartIncluding": "6.1.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When a Multipart request is performed but some of the fields exceed the maxStringLength\u00a0 limit, the upload files will remain in struts.multipart.saveDir\u00a0 even if the request has been denied.\nUsers are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue." }, { "lang": "es", "value": "Cuando se realiza una solicitud multiparte pero algunos de los campos exceden el l\u00edmite maxStringLength, los archivos cargados permanecer\u00e1n en struts.multipart.saveDir incluso si la solicitud ha sido denegada. Se recomienda a los usuarios actualizar a las versiones Struts 2.5.32 o 6.1.2.2 o Struts 6.3.0.1 o superior, que solucionan este problema." } ], "id": "CVE-2023-41835", "lastModified": "2025-05-28T16:15:30.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-12-05T09:15:07.093", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Release Notes" ], "url": "https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2023/12/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Release Notes" ], "url": "https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2023/12/09/1" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-09 15:08
Modified
2025-04-09 00:30
Severity ?
Summary
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFF7B2B-1DD7-46F4-9EF3-CB486EA84D94", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tiles:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A48583E6-A6FB-4F6E-AB8D-75BC999EE8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tiles:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "500C802F-65FF-4CD4-863C-063760B67116", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags." }, { "lang": "es", "value": "Apache Tiles v2.1 anteriores a v2.1.2, como las usadas en Apache Struts y otros productos, eval\u00faan las expresiones del lenguaje de expresiones (EL), dos veces en ciertas circunstancias, lo que permite a atacantes remotos conducir ataques de secuencias de comandos en sitios cruzados (XSS) para obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados, relativo a (1) tiles:putAttribute y (2) etiquetas JSP tiles:insertTemplate." } ], "id": "CVE-2009-1275", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-09T15:08:35.813", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34657" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/TILES-351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/TILES-351" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-16 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E131A64-B846-4751-BF3E-C697A90C49E7", "versionEndExcluding": "2.3.14.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135." }, { "lang": "es", "value": "Apache Struts 2 anterior a 2.3.14.3 permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo OGNL a trav\u00e9s de peticiones con un nombre de acci\u00f3n manipulado que no es manejado correctamente durante la comparaci\u00f3n de comodines. Vulnerabilidad distinta de CVE-2013-2135." } ], "id": "CVE-2013-2134", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-16T18:55:01.380", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201409-04.xml" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60346" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201409-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-26 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter." }, { "lang": "es", "value": "XSLTResult en Apache Struts 2.x en versiones anteriores a 2.3.20.2, 2.3.24.x en versiones anteriores a 2.3.24.2 y 2.3.28.x en versiones anteriores a 2.3.28.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de hoja de c\u00e1lculo location." } ], "id": "CVE-2016-3082", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-26T14:59:03.190", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-031.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/88826" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1035664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/88826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035664" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-20 03:37
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 | |
apache | struts | 2.2.1 | |
apache | struts | 2.2.1.1 | |
apache | struts | 2.2.3 | |
apache | struts | 2.2.3.1 | |
apache | struts | 2.3.1 | |
apache | struts | 2.3.1.1 | |
apache | struts | 2.3.1.2 | |
apache | struts | 2.3.3 | |
apache | struts | 2.3.4 | |
apache | struts | 2.3.4.1 | |
apache | struts | 2.3.7 | |
apache | struts | 2.3.8 | |
apache | struts | 2.3.12 | |
apache | struts | 2.3.14 | |
apache | struts | 2.3.14.1 | |
apache | struts | 2.3.14.2 | |
apache | struts | 2.3.14.3 | |
apache | struts | 2.3.15 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de redirecci\u00f3n en Apache Struts v2.0.0 hasta v2.3.15 permite a atacantes remotos redirigir a los usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing mediante una URL en un par\u00e1metro usando (1) redirect: o (2) redirectAction:" } ], "id": "CVE-2013-2248", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-07-20T03:37:30.717", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-017.html" }, { "source": "secalert@redhat.com", "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/61196" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64758" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-27 21:29
Modified
2024-11-21 03:59
Severity ?
Summary
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CFC49D8-75B5-4F72-B0AB-FFBB8CAC4553", "versionEndIncluding": "2.5.14.1", "versionStartIncluding": "2.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16." }, { "lang": "es", "value": "El plugin REST en Apache Struts emplea una biblioteca XStream vulnerable y que permite llevar a cabo un ataque de denegaci\u00f3n de servicio (DoS) cuando utiliza una petici\u00f3n maliciosa con una carga \u00fatil XML especialmente manipulada. Se recomienda actualizar a la versi\u00f3n 2.5.16 de Apache Struts y cambiar a un controlador de XML Jackson opcional como se explica en el siguiente enlace: http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Otra opci\u00f3n es implementar un controlador de XML a medida, basado en el controlador de XML Jackson de la versi\u00f3n 2.5.16 de Apache Struts." } ], "id": "CVE-2018-1327", "lastModified": "2024-11-21T03:59:38.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-27T21:29:00.970", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103516" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040575" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-056" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180330-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180330-0001/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-07 04:09
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de comandos en sitos cruzados (XSS) en Apache Struts v2.0.14 y v2.2.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de los par\u00e1metros (1) Name o (2) LastName en struts2-showcase/person/ editPerson.action, o (3) el par\u00e1metro ClientName a struts2-rest-showcase/orders." } ], "id": "CVE-2012-1006", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-02-07T04:09:20.330", "references": [ { "source": "cve@mitre.org", "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "source": "cve@mitre.org", "url": "http://secpod.org/blog/?p=450" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51902" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secpod.org/blog/?p=450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-08 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "3652F64A-97BA-430E-8C69-E7C01366D20A", "versionEndExcluding": "2.3.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method." }, { "lang": "es", "value": "El componente CookieInterceptor en Apache Struts antes de v2.3.1.1 no utiliza una lista blanca de nombres de par\u00e1metros, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cabecera de una Cookie HTTP debidamente modificada que desencadena la ejecuci\u00f3n de c\u00f3digo Java a trav\u00e9s de un m\u00e9todo est\u00e1tico." } ], "id": "CVE-2012-0392", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-08T15:55:01.373", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/47393" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lists.immunityinc.com/pipermail/dailydave/2012-January/000011.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/47393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lists.immunityinc.com/pipermail/dailydave/2012-January/000011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-20 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "84408BC6-E785-4874-9409-AC02AF0A7897", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "79E08D3E-9F86-4E9D-B1BF-EBEA8AB3BEE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "8E5068CA-A472-47D2-A89F-A43EA8617874", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "E17D62B8-349B-4F30-8849-6912828802C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "D5E91133-D585-43F7-9093-94D735B3167E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "DD44FD72-ECE7-4E08-AD9E-5CE2C310C2C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack." }, { "lang": "es", "value": "En Apache Struts versiones 2.0.0 hasta 2.3.33 y versiones 2.5 hasta 2.5.10.1, el uso de una expresi\u00f3n no intencional en una etiqueta Freemarker en lugar de literales de cadena podr\u00eda conllevar a un ataque de tipo RCE." } ], "id": "CVE-2017-12611", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-20T17:29:00.400", "references": [ { "source": "security@apache.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100829" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001" }, { "source": "security@apache.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-053.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 | |
apache | struts | 2.2.1 | |
apache | struts | 2.2.1.1 | |
opensymphony | webwork | * | |
opensymphony | xwork | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensymphony:webwork:*:*:*:*:*:*:*:*", "matchCriteriaId": "09604417-9AF3-4F95-8E7A-695AD510168E", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D54BC82-0A21-42F7-9439-EB6BF2E95393", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en XWork en Apache Struts v2.x anterior a v2.2.3, y OpenSymphony XWork en OpenSymphony WebWork, permite a atacantes remotos inyectar c\u00f3digo web script o HTML a trav\u00e9s de vectores que implican (1) un \"action name\", (2) la acci\u00f3n atributo de un elemento \"s:submit\", o (3) el atributo del m\u00e9todo del elemento \"s:submit\"." } ], "id": "CVE-2011-1772", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-05-13T17:05:44.267", "references": [ { "source": "secalert@redhat.com", "url": "http://jvn.jp/en/jp/JVN25435092/index.html" }, { "source": "secalert@redhat.com", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106" }, { "source": "secalert@redhat.com", "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "source": "secalert@redhat.com", "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://struts.apache.org/2.x/docs/s2-006.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/47784" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN25435092/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://struts.apache.org/2.x/docs/s2-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/47784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/WW-3579" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-30 14:29
Modified
2025-04-20 01:37
Severity ?
Summary
The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/85131 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20180629-0005/ | ||
secalert@redhat.com | https://struts.apache.org/docs/s2-027.html | Vendor Advisory | |
secalert@redhat.com | https://www.securitytracker.com/id/1035267 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/85131 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180629-0005/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://struts.apache.org/docs/s2-027.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.securitytracker.com/id/1035267 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "15DF9C2B-A631-4530-8C99-C97BC1944CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "84408BC6-E785-4874-9409-AC02AF0A7897", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "79E08D3E-9F86-4E9D-B1BF-EBEA8AB3BEE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling." }, { "lang": "es", "value": "El m\u00e9todo TextParseUtil.translateVariables en las versiones 2.x anteriores a la 2.3.20 de Apache Struts permite que atacantes remotos ejecuten c\u00f3digo arbitrario mediante una expresi\u00f3n OGNL manipulada con herramientas ANTLR." } ], "id": "CVE-2016-3090", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-30T14:29:00.767", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85131" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20180629-0005/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-027.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securitytracker.com/id/1035267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/85131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securitytracker.com/id/1035267" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-03-02 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://jvn.jp/en/jp/JVN79099262/index.html | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://struts.apache.org/2.3.1.2/docs/s2-007.html | Vendor Advisory | |
secalert@redhat.com | https://issues.apache.org/jira/browse/WW-3668 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN79099262/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/2.3.1.2/docs/s2-007.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/WW-3668 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA7C05A5-29E9-40E8-8E80-1265F8202CC3", "versionEndIncluding": "2.2.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field." }, { "lang": "es", "value": "Apache Struts 2 anteriores a 2.2.3.1 eval\u00faa una cadena como una expresi\u00f3n OGNL durante el manejo de un error de conversi\u00f3n, lo que permite a atacantes remotos modificar valores de datos de tiempo de ejecuci\u00f3n y, por lo tanto, ejecutar c\u00f3digo arbitrario, a trav\u00e9s de una entrada inv\u00e1lida de un campo." } ], "id": "CVE-2012-0838", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-03-02T22:55:01.337", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN79099262/index.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.3.1.2/docs/s2-007.html" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN79099262/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.3.1.2/docs/s2-007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-3668" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 | |
apache | struts | 2.2.1 | |
apache | struts | 2.2.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en los controladores de componente en el plugin javatemplates (tambi\u00e9n conocido como plantillas de Java) en Apache Struts v2.x antes de v2.2.3, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de un valor de par\u00e1metro arbitrario a .action URI, relacionado con a una manipulaci\u00f3n incorrecta del valor de los atributos en un (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler. Java, (7) SubmitHandler.java y (8) TextFieldHandler.java." } ], "id": "CVE-2011-2087", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-05-13T17:05:45.253", "references": [ { "source": "cve@mitre.org", "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://issues.apache.org/jira/browse/WW-3597" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/jira/browse/WW-3608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://issues.apache.org/jira/browse/WW-3597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/WW-3608" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-12 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://struts.apache.org/docs/s2-028.html | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/86311 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1035268 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://issues.apache.org/jira/browse/WW-4507 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/docs/s2-028.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/86311 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035268 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/WW-4507 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1F46D0C-BEAD-4CF3-827F-28D3BFD0A4AB", "versionEndIncluding": "2.3.24.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la funci\u00f3n URLDecoder en JRE en versiones anteriores a 1.8, tal y como se utiliza en Apache Struts 2.x en versiones anteriores a 2.3.28, cuando utiliza una codificaci\u00f3n de p\u00e1gina de un solo byte, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de caracteres multi-byte en un par\u00e1metro con codificaci\u00f3n url." } ], "id": "CVE-2016-4003", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-12T16:59:04.313", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-028.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/86311" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035268" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-4507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/86311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-4507" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-30 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "4839E719-F3DA-4768-BB37-B575207BEC22", "versionEndIncluding": "1.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message." } ], "id": "CVE-2006-1548", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-03-30T22:02:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38749" }, { "source": "secalert@redhat.com", "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/19493" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20117" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1015856" }, { "source": "secalert@redhat.com", "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/17342" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25614" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/struts/browse/STR-2781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/struts/browse/STR-2781" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-30 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "7604257C-19FC-442E-B57F-632437AC55FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A6A6590-D8F5-4DB8-BE77-D0FC9B29E183", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CCECB33-4CA3-4519-A733-3529B70AB9BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:2.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5104F0A-CD23-4A6E-AD59-B6F5A949B006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D2673F9-7908-45AA-8A06-3D1D15073EB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "11CCF1EE-70D3-40C9-9797-AE6228DA8522", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E00A28FF-FE53-487A-BB20-70EBDF50EB3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D814C515-A146-4A83-B0B7-FCEF7221D57A", "versionEndIncluding": "2.3.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B1D477-792A-4443-96F1-43310C464152", "versionEndIncluding": "3.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:11.1.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "743086BB-8F3E-4D6C-9050-F736478D8FCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BB4709C-6373-43CC-918C-876A6569865A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors." }, { "lang": "es", "value": "Apache Struts 2.0.0 hasta la versi\u00f3n 2.3.15.1 habilita por defecto Dynamic Method Invocation, lo cual tiene un impacto y vectores de ataque desconocidos." } ], "id": "CVE-2013-4316", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-30T21:55:09.630", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029078" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" }, { "lang": "en", "value": "CWE-284" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-10 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://struts.apache.org/development/2.x/docs/s2-014.html | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/60167 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=967656 | Issue Tracking | |
secalert@redhat.com | https://cwiki.apache.org/confluence/display/WW/S2-014 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/development/2.x/docs/s2-014.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/60167 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=967656 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://cwiki.apache.org/confluence/display/WW/S2-014 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2C8346C-B2AF-4D65-9642-9FDE5E5F828C", "versionEndIncluding": "2.3.14.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966." }, { "lang": "es", "value": "Apache Struts 2 anterior a 2.3.14.2, permite a atacantes remotos ejecutar c\u00f3digo OGNL a trav\u00e9s de una petici\u00f3n manipulada que no es manejada adecuadamente cuando se usa el atributo includeParams en la (1)URL o la (2) etiqueta A. NOTA: esta cuesti\u00f3n se debe a una correcci\u00f3n incorrecta del CVE-2013-1966." } ], "id": "CVE-2013-2115", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2013-07-10T19:55:04.770", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-014.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60167" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-014" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-29 10:37
Modified
2025-04-12 10:46
Severity ?
Summary
CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "769DE043-2954-4F02-A260-91484452AC83", "versionEndExcluding": "2.3.16.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094." }, { "lang": "es", "value": "CookieInterceptor en Apache Struts versiones anteriores a 2.3.20, cuando un valor de cookiesName comod\u00edn es usado, no restringe correctamente el acceso al m\u00e9todo getClass, lo que permite a atacantes remotos \"manipulate\" el ClassLoader y ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n dise\u00f1ada. NOTA: esta vulnerabilidad se presenta debido a una correcci\u00f3n incompleta de CVE-2014-0094." } ], "id": "CVE-2014-0113", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-29T10:37:03.700", "references": [ { "source": "secalert@redhat.com", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59178" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-15 19:29
Modified
2025-04-20 01:37
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
apache | struts | * | |
cisco | digital_media_manager | - | |
cisco | hosted_collaboration_solution | 10.5\(1\) | |
cisco | hosted_collaboration_solution | 11.0\(1\) | |
cisco | hosted_collaboration_solution | 11.5\(1\) | |
cisco | hosted_collaboration_solution | 11.6\(1\) | |
cisco | media_experience_engine | 3.5 | |
cisco | media_experience_engine | 3.5.2 | |
cisco | network_performance_analysis | - | |
cisco | video_distribution_suite_for_internet_streaming | - | |
netapp | oncommand_balance | - |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Deserialization of Untrusted Data Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "13744BE3-2443-4640-BDB4-722C4D393B65", "versionEndExcluding": "2.3.34", "versionStartIncluding": "2.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B45E858-E783-4D6E-AFD3-97E9963EB05B", "versionEndExcluding": "2.5.13", "versionStartIncluding": "2.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0B1E953-33EF-498D-AB75-4A0A7733BC54", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF4C9089-0F27-4C66-8E12-2BCAC148B7C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7FCC3E9D-4D39-4530-A5FC-7E9A4E395D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F972A2A1-3002-4086-8FA2-F231D4ED0B00", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:11.6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D52C5D91-33D1-4C90-BEC9-90D955AA5883", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:media_experience_engine:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "93C3A3B2-B346-47F4-B987-0098AB95F939", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:media_experience_engine:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "87CCEC7F-058D-4202-88B3-F06372DFFA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_performance_analysis:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D400A4-9918-494E-89B7-EAA57B2830D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:video_distribution_suite_for_internet_streaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "912F9C5E-AA5F-4746-AC49-D33C2495C73B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads." }, { "lang": "es", "value": "El Plugin REST en Apache Struts versiones 2.1.1 hasta 2.3.x anteriores a 2.3.34 y versiones 2.5.x anteriores a 2.5.13, usa una XStreamHandler con una instancia de XStream para deserializaci\u00f3n sin ning\u00fan filtrado de tipos, lo que puede conllevar a una ejecuci\u00f3n de c\u00f3digo remota cuando se deserializan cargas XML." } ], "id": "CVE-2017-9805", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2017-09-15T19:29:00.237", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100609" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039263" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488482" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-052" }, { "source": "security@apache.org", "tags": [ "Broken Link" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170907-0001/" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-052.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42627/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/112992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170907-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42627/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/112992" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-08 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A92C89B-0DAE-4288-AAC5-5A84D195B281", "versionEndIncluding": "2.3.17", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not \"a security vulnerability itself." }, { "lang": "es", "value": "** CUESTIONADA ** El componente DebuggingInterceptor en Apache Struts antes de la versi\u00f3n v2.3.1.1, cuando se usa el modo desarrollador (developer), permite ejecutar comandos de su elecci\u00f3n a atacantes remotos a trav\u00e9s de vectores no especificados. NOTA: el vendedor indica que este comportamiento \"no es una vulnerabilidad de seguridad en si misma\"." } ], "id": "CVE-2012-0394", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-08T15:55:01.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/31434" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/78276" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/31434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/78276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-14 17:15
Modified
2024-11-21 04:16
Severity ?
Summary
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
oracle | communications_policy_management | 12.5.0 | |
oracle | financial_services_data_integration_hub | 8.0.3 | |
oracle | financial_services_data_integration_hub | 8.0.6 | |
oracle | financial_services_market_risk_measurement_and_management | 8.0.6 | |
oracle | mysql_enterprise_monitor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "A38218D5-0245-4ECE-8215-DEFEAB975689", "versionEndIncluding": "2.5.20", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5312AC7A-3C16-4967-ACA6-317289A749D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "25B0D39E-A630-4C85-AF90-396FB3E0FE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "987A0C35-4C7F-4FFB-B47B-37B69A32F879", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D5112-4055-4F89-A5B3-0DCB109481B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "F48F2267-61EA-4F12-ADE9-85CB6F6B290E", "versionEndIncluding": "8.0.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution." }, { "lang": "es", "value": "Apache Struts versiones 2.0.0 hasta 2.5.20, forz\u00f3 una evaluaci\u00f3n OGNL doble, cuando se evaluaba en la entrada del usuario sin procesar en los atributos de la etiqueta, puede conllevar a una ejecuci\u00f3n de c\u00f3digo remota" } ], "id": "CVE-2019-0230", "lastModified": "2024-11-21T04:16:32.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-14T17:15:09.933", "references": [ { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-059" }, { "source": "security@apache.org", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1321" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-10-03 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "E17D62B8-349B-4F30-8849-6912828802C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "D5E91133-D585-43F7-9093-94D735B3167E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "DD44FD72-ECE7-4E08-AD9E-5CE2C310C2C8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up." }, { "lang": "es", "value": "Apache Struts 2 en versiones anteriores a 2.3.29 y 2.5.x en versiones anteriores a 2.5.1 permiten a atacantes tener impacto no especificado a trav\u00e9s de vectores relacionados con la limpieza de un nombre de acci\u00f3n inapropiado." } ], "id": "CVE-2016-4436", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-03T15:59:01.913", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/91280" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/91280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-035.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method." }, { "lang": "es", "value": "Apache Struts 2 2.3.20 hasta la versi\u00f3n 2.3.28.1 permite a atacantes remotos eludir las restricciones destinadas al acceso y llevar a cabo ataques de redirecci\u00f3n aprovechando un m\u00e9todo por defecto." } ], "id": "CVE-2016-4431", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:06.413", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "source": "secalert@redhat.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000113" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91284" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348252" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-040.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.2.1 | |
opensymphony | xwork | 2.2.1 | |
opensymphony | webwork | - | |
opensymphony | xwork | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "86571CB0-00C3-407E-AA23-F84628AC4EA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensymphony:webwork:-:*:*:*:*:*:*:*", "matchCriteriaId": "68D68135-A485-4A9D-AA01-6F11D166A604", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:-:*:*:*:*:*:*:*", "matchCriteriaId": "63E63E98-5734-4CA9-98BA-1040B2CF4C77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3." }, { "lang": "es", "value": "XWork v2.2.1 en Apache Struts v2.2.1, y XWork OpenSymphony en OpenSymphony WebWork, permite a atacantes remotos obtener informaci\u00f3n sensible acerca de las rutas internas de clases Java a trav\u00e9s de vectores implican un elemento s:submit y un m\u00e9todo inexistente, una vulnerabilidad diferente de CVE-2011-1772.3." } ], "id": "CVE-2011-2088", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-05-13T17:05:45.283", "references": [ { "source": "cve@mitre.org", "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "source": "cve@mitre.org", "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://issues.apache.org/jira/browse/WW-3579" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-29 10:37
Modified
2025-04-12 10:46
Severity ?
Summary
ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "769DE043-2954-4F02-A260-91484452AC83", "versionEndExcluding": "2.3.16.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094." }, { "lang": "es", "value": "ParametersInterceptor en Apache Struts versiones anteriores a 2.3.20, no restringe apropiadamente el acceso al m\u00e9todo getClass, lo que permite a atacantes remotos \"manipulate\" el ClassLoader y ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n dise\u00f1ada. NOTA: esta vulnerabilidad se presenta debido a una correcci\u00f3n incompleta de CVE-2014-0094." } ], "id": "CVE-2014-0112", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-29T10:37:03.670", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "source": "secalert@redhat.com", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59178" }, { "source": "secalert@redhat.com", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59500" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67064" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0910" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091939" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-03-30 22:02
Modified
2025-04-03 01:03
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
apache | commons_beanutils | 1.7.0 |
{ "cisaActionDue": "2022-07-21", "cisaExploitAdd": "2022-01-21", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts 1 ActionForm Denial-of-Service Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "B108ED90-C4AA-496F-B3C7-4AA392564C1F", "versionEndExcluding": "1.2.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:commons_beanutils:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7987ADF-7D37-4D26-BA04-B4279082F327", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils." } ], "id": "CVE-2006-1547", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2006-03-30T22:02:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Issue Tracking" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38534" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/19493" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/20117" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1015856" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Exploit", "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/17342" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Issue Tracking" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/19493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/20117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1015856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/17342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25613" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-749" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2005-11-22 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Apache Struts 1.2.7, y posiblemente otras versiones, permite a atacantes remotos inyectar \u0027script\u0027 web o HTML de su elecci\u00f3n mediante la cadena de consulta, que no es entrecomillada o filtrada adecuadamente cuando el manejador de peticiones genera un mensaje de error." } ], "id": "CVE-2005-3745", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-11-22T11:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17677" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18341" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/197" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015257" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.hacktics.com/AdvStrutsNov05.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/21021" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2006-0157.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2006-0161.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/417296/30/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/15512" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2005/2525" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.hacktics.com/AdvStrutsNov05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/21021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0157.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/417296/30/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/15512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2005/2525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-08 10:55
Modified
2025-04-12 10:46
Severity ?
Summary
CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113." }, { "lang": "es", "value": "CookieInterceptor en Apache Struts versiones 2.x anteriores a 2.3.20, cuando un valor de cookiesName comod\u00edn es usado, no restringe apropiadamente el acceso al m\u00e9todo getClass, lo que permite a atacantes remotos \"manipulate\" el ClassLoader y modificar el estado de la sesi\u00f3n por medio de una petici\u00f3n dise\u00f1ada. NOTA: esta vulnerabilidad se presenta debido a una correcci\u00f3n incompleta de CVE-2014-0113." } ], "id": "CVE-2014-0116", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-08T10:55:02.967", "references": [ { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59816" }, { "source": "secalert@redhat.com", "url": "http://struts.apache.org/release/2.3.x/docs/s2-022.html" }, { "source": "secalert@redhat.com", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/67218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://struts.apache.org/release/2.3.x/docs/s2-022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/67218" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-11 02:15
Modified
2025-04-03 16:07
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
oracle | business_intelligence | 12.2.1.3.0 | |
oracle | business_intelligence | 12.2.1.4.0 | |
oracle | communications_diameter_intelligence_hub | 8.0.0 | |
oracle | communications_diameter_intelligence_hub | 8.1.0 | |
oracle | communications_diameter_intelligence_hub | 8.2.0 | |
oracle | communications_diameter_intelligence_hub | 8.2.3 | |
oracle | communications_policy_management | 12.5.0 | |
oracle | communications_pricing_design_center | 12.0.0.3.0 | |
oracle | financial_services_data_integration_hub | 8.0.3 | |
oracle | financial_services_data_integration_hub | 8.0.6 | |
oracle | hospitality_opera_5 | 5.6 | |
oracle | mysql_enterprise_monitor | 8.0.23 |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "23D366CD-5A53-400A-B846-D4F287915BC5", "versionEndExcluding": "2.5.30", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "77C3DD16-1D81-40E1-B312-50FBD275507C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "81DAC8C0-D342-44B5-9432-6B88D389584F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2E30096-0B9A-4301-A34A-DAECE85FE1F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B88D928-9735-4E5C-B8D3-597AB2A15854", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A02B1-4E35-4054-9FEB-886985267199", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C3027474-CF8F-432D-9295-C56CD9A8B710", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5312AC7A-3C16-4967-ACA6-317289A749D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7B49D71-6A31-497A-B6A9-06E84F086E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "25B0D39E-A630-4C85-AF90-396FB3E0FE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "987A0C35-4C7F-4FFB-B47B-37B69A32F879", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:hospitality_opera_5:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "95D6A426-B914-401F-9AB0-5F5E3A3FE138", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "955955B3-95F0-4887-97DC-58FB7A13F257", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25." }, { "lang": "es", "value": "Una evaluaci\u00f3n OGNL forzada, cuando se eval\u00faa seg\u00fan la entrada del usuario sin procesar en los atributos de la etiqueta, puede conllevar a una ejecuci\u00f3n de c\u00f3digo remota.\u0026#xa0;Software afectado: Apache Struts versi\u00f3n 2.0.0 - Struts versi\u00f3n 2.5.25" } ], "id": "CVE-2020-17530", "lastModified": "2025-04-03T16:07:29.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-12-11T02:15:10.883", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN43969166/index.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://jvn.jp/en/jp/JVN43969166/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-917" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-917" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the \"#\" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504." }, { "lang": "es", "value": "La capacidad OGNL extensive expression evaluation en XWork de Struts v2.0.0 hasta v2.1.8.1, como el usado en Atlassian Fisheye, Crucible,y posiblemente otros productos, usa una lista blanca permisiva, la cual permite a atacantes remotos modificar los objetos del contexto del lado del servidor y evitar el mecanismo de protecci\u00f3n \"#\" en ParameterInterceptors a trav\u00e9s de (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, y posiblemente otras variables de contexto OGNL, una vulnerabilidad diferente de CVE-2008-6504." } ], "id": "CVE-2010-1870", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-17T20:00:03.407", "references": [ { "source": "cve@mitre.org", "url": "http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2010/Jul/183" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2020/Oct/23" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/59110" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/8345" }, { "source": "cve@mitre.org", "url": "http://struts.apache.org/2.2.1/docs/s2-005.html" }, { "source": "cve@mitre.org", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14360" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/66280" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/41592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2010/Jul/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2020/Oct/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://struts.apache.org/2.2.1/docs/s2-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/66280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41592" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-01 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
netapp | oncommand_balance | - | |
oracle | agile_plm_framework | 9.3.6 | |
oracle | enterprise_manager_for_virtualization | 13.2.2 | |
oracle | enterprise_manager_for_virtualization | 13.2.3 | |
oracle | financial_services_hedge_management_and_ifrs_valuations | 8.0.4 | |
oracle | financial_services_hedge_management_and_ifrs_valuations | 8.0.5 | |
oracle | financial_services_market_risk_measurement_and_management | 8.0.5 | |
oracle | global_lifecycle_management_opatchauto | * | |
oracle | jd_edwards_enterpriseone_tools | 9.2 | |
oracle | retail_order_broker | 5.2 | |
oracle | retail_xstore_point_of_service | 6.5.11 | |
oracle | retail_xstore_point_of_service | 7.0.6 | |
oracle | retail_xstore_point_of_service | 7.1.6 | |
oracle | retail_xstore_point_of_service | 15.0.1 | |
oracle | retail_xstore_point_of_service | 16.0.2 | |
oracle | webcenter_portal | 12.2.1.2.0 | |
oracle | webcenter_portal | 12.2.1.3.0 | |
oracle | weblogic_server | 12.2.1.2 | |
oracle | weblogic_server | 12.2.1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "351976F7-D1E8-4EAE-9F2A-46122E9D7424", "versionEndIncluding": "2.5.14", "versionStartIncluding": "2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:agile_plm_framework:9.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FFB44079-8054-48BC-A8B5-B637AD1F9DFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E97F04-00ED-48E9-AB40-7A02B3419641", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCCE5A11-39E7-4BBB-9E1A-BA4B754103BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8DECBF5C-6C87-424F-A116-DD534EC5946C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "3469C84E-50F3-4461-864C-E59174DDC981", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "402B8642-7ACC-4F42-87A9-AB4D3B581751", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:global_lifecycle_management_opatchauto:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A877F1B-4B25-48E2-B473-0E76ED3948A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "41684398-18A4-4DC6-B8A2-3EBAA0CBF9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "77C2A2A4-285B-40A1-B9AD-42219D742DD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:6.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "F1223C57-DA2C-42C0-9DCC-6124DF3AE67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B3354D-3929-4AEC-AAE0-7F573341FD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "55901EF7-B71C-40B3-B276-FDA6381F051F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "385D40CC-5AA0-4DAB-A2E7-F3A3CFF95BA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "71D81AE2-9ABF-4C1B-B7F5-0549C8DFBBF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A11496F-FECC-46C5-B914-F2B32423BEFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4F71A-4269-40FC-8F61-1D1301F2B728", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "DAE3D682-1434-4789-8B43-679AE86533FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBFF04EF-B1C3-4601-878A-35EA6A15EF0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload." }, { "lang": "es", "value": "El plugin REST en Apache Struts desde la versi\u00f3n 2.5 hasta la 2.5.14 emplea una librer\u00eda JSON-lib desactualizada vulnerable y que permite llevar a cabo un ataque de denegaci\u00f3n de servicio utilizando una petici\u00f3n maliciosa con una carga \u00fatil JSON especialmente manipulada." } ], "id": "CVE-2017-15707", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-01T16:29:00.247", "references": [ { "source": "security@apache.org", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "security@apache.org", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102021" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039946" }, { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-054" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171214-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171214-0001/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-10 16:29
Modified
2025-04-20 01:37
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.3.1 | |
apache | struts | 2.3.1.1 | |
apache | struts | 2.3.1.2 | |
apache | struts | 2.3.3 | |
apache | struts | 2.3.4 | |
apache | struts | 2.3.4.1 | |
apache | struts | 2.3.7 | |
apache | struts | 2.3.8 | |
apache | struts | 2.3.12 | |
apache | struts | 2.3.14 | |
apache | struts | 2.3.14.1 | |
apache | struts | 2.3.14.2 | |
apache | struts | 2.3.14.3 | |
apache | struts | 2.3.15 | |
apache | struts | 2.3.15.1 | |
apache | struts | 2.3.15.2 | |
apache | struts | 2.3.15.3 | |
apache | struts | 2.3.16 | |
apache | struts | 2.3.16.1 | |
apache | struts | 2.3.16.2 | |
apache | struts | 2.3.16.3 | |
apache | struts | 2.3.20 | |
apache | struts | 2.3.20.1 | |
apache | struts | 2.3.20.3 | |
apache | struts | 2.3.24 | |
apache | struts | 2.3.24.1 | |
apache | struts | 2.3.24.3 | |
apache | struts | 2.3.28 | |
apache | struts | 2.3.28.1 | |
apache | struts | 2.3.29 | |
apache | struts | 2.3.30 | |
apache | struts | 2.3.31 | |
apache | struts | 2.3.32 |
{ "cisaActionDue": "2022-08-10", "cisaExploitAdd": "2022-02-10", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts 1 Improper Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage." }, { "lang": "es", "value": "El plugin Struts 1 en Apache Struts versiones 2.1.x y 2.3.x, podr\u00eda permitir la ejecuci\u00f3n de c\u00f3digo remota por medio de un valor de campo malicioso pasado en un mensaje sin procesar en la ActionMessage." } ], "id": "CVE-2017-9791", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2017-07-10T16:29:00.277", "references": [ { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-048.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99484" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038838" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42324/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44643/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/42324/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44643/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-20 17:29
Modified
2025-04-20 01:37
Severity ?
Summary
In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.securityfocus.com/bid/94657 | Third Party Advisory, VDB Entry | |
security@apache.org | https://security.netapp.com/advisory/ntap-20180629-0003/ | ||
security@apache.org | https://struts.apache.org/docs/s2-044.html | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94657 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180629-0003/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://struts.apache.org/docs/s2-044.html | Mitigation, Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL." }, { "lang": "es", "value": "En Apache Struts desde la versi\u00f3n 2.5 hasta la 2.5.5, si una aplicaci\u00f3n permite la introducci\u00f3n de una URL en un campo de un formulario y se emplea URLValidator (integrado), es posible preparar una URL especial que ser\u00e1 usada para sobrecargar el proceso del servidor cuando se lleva a cabo la validaci\u00f3n de la URL." } ], "id": "CVE-2016-8738", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-20T17:29:00.337", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94657" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-044.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-05 21:15
Modified
2024-11-21 01:37
Severity ?
Summary
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files." }, { "lang": "es", "value": "Se presenta un problema de ejecuci\u00f3n de c\u00f3digo local en Apache Struts2 cuando se procesan archivos XSLT malformados, lo que podr\u00eda permitir a un usuario malicioso cargar y ejecutar archivos arbitrarios." } ], "id": "CVE-2012-1592", "lastModified": "2024-11-21T01:37:16.203", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-05T21:15:11.427", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/28/12" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2012-1592" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1592" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r348ed455a140273c40b974f0615dee692f7c9b26c6de2118b4280ef2%40%3Cissues.struts.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r593ebb2f4c95b064e6901fd273eff256c493db952bdb484395948ffc%40%3Cissues.struts.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r93c4e3f6cb138cd117c739714f07e47af547183ba099ba46be2b2a5b%40%3Cissues.struts.apache.org%3E" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-1592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/28/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2012-1592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r348ed455a140273c40b974f0615dee692f7c9b26c6de2118b4280ef2%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r593ebb2f4c95b064e6901fd273eff256c493db952bdb484395948ffc%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r93c4e3f6cb138cd117c739714f07e47af547183ba099ba46be2b2a5b%40%3Cissues.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-1592" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-27 18:15
Modified
2024-11-21 02:28
Severity ?
Summary
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN88408929/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | http://www.securityfocus.com/bid/76624 | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://security.netapp.com/advisory/ntap-20200330-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN88408929/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/76624 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20200330-0001/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "62C966E8-B78E-4B95-9B41-ED60849A1B3B", "versionEndExcluding": "2.3.20", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability." }, { "lang": "es", "value": "Apache Struts versiones anteriores a 2.3.20, presenta una vulnerabilidad de tipo cross-site scripting (XSS)" } ], "id": "CVE-2015-2992", "lastModified": "2024-11-21T02:28:27.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-27T18:15:11.123", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN88408929/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76624" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200330-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN88408929/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200330-0001/" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-08 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/47109 | Permissions Required | |
cve@mitre.org | https://issues.apache.org/jira/browse/WW-2264 | Issue Tracking, Vendor Advisory | |
cve@mitre.org | https://issues.apache.org/jira/browse/WW-3631 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/47109 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/WW-2264 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/jira/browse/WW-3631 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F6A7F8F-9CDB-443B-9A0E-A944856A7348", "versionEndExcluding": "2.3.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an \"easy work-around in existing apps by configuring the interceptor.\"" }, { "lang": "es", "value": "Apache Struts versi\u00f3n 2.3.1.2 y anteriores, versiones 2.3.19 hasta 2.3.23, proporciona interfaces que no restringen apropiadamente el acceso a colecciones tales como las colecciones de sesiones y peticiones, lo que podr\u00eda permitir a atacantes remotos modificar los valores de datos de tiempo de ejecuci\u00f3n por medio de un par\u00e1metro dise\u00f1ado para una aplicaci\u00f3n que implementa una interfaz afectada, como es demostrado por las interfaces de SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware y ParameterAware. NOTA: el proveedor cuestiona la importancia de este reporte debido a una \"easy work-around in existing apps by configuring the interceptor\"." } ], "id": "CVE-2011-5057", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-08T17:55:00.903", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/47109" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-2264" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-3631" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/47109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-2264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-3631" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-04-30 10:49
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | commons_beanutils | * | |
apache | struts | 1.0 | |
apache | struts | 1.0.2 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.2.2 | |
apache | struts | 1.2.4 | |
apache | struts | 1.2.6 | |
apache | struts | 1.2.7 | |
apache | struts | 1.2.8 | |
apache | struts | 1.2.9 | |
apache | struts | 1.3.5 | |
apache | struts | 1.3.8 | |
apache | struts | 1.3.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:commons_beanutils:*:*:*:*:*:*:*:*", "matchCriteriaId": "02FF6542-F5F7-465D-9755-E4EFC8953453", "versionEndIncluding": "1.9.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5051228-446E-461D-9B5F-8F765C7BA57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*", "matchCriteriaId": "93FA9AE3-B453-4FE6-82A9-7DDEF3F6C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*", "matchCriteriaId": "A3BB6FBE-469B-4920-A30B-33AD9E41ACCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*", "matchCriteriaId": "34FC82D3-CCAF-4F37-B531-2A9CA17311A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "E0B8B413-8C62-44B6-A382-26F35F4573D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "6309C679-890A-4214-8857-9F119CBBAA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD882860-03D0-49E9-8CED-DE6663392548", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B2ECF5E1-457F-4E76-81F7-65114DC4E1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C34FDB0-2778-4C36-8345-F7E27509A383", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF0302D3-CB8D-4FA7-8F07-C2C7593877BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "03906D34-F3B3-4C56-A6A6-2F7A10168501", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1B3872B7-2972-433D-96A1-154FA545B311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1." }, { "lang": "es", "value": "Apache Commons BeanUtils, seg\u00fan se distribuye en lib/commons-beanutils-1.8.0.jar en Apache Struts 1.x hasta la versi\u00f3n 1.3.10 y en otros productos que requieren commons-beanutils hasta la versi\u00f3n 1.9.2, no suprime la propiedad class, lo que permite a atacantes remotos \"manipular\" el ClassLoader y ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro class, seg\u00fan lo demostrado por el paso de este par\u00e1metro al m\u00e9todo getClass del objeto ActionForm en Struts 1." } ], "id": "CVE-2014-0114", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-30T10:49:03.973", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2014-0219.html" }, { "source": "secalert@redhat.com", "url": "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" }, { "source": "secalert@redhat.com", "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq\u0026m=140119284401582\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq\u0026m=140801096002766\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq\u0026m=141451023707502\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2014/06/15/10" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2014/07/08/1" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/57477" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58710" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58851" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58947" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59014" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59118" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59228" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59245" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59246" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59430" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59464" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59479" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59480" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59704" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59718" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60177" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60703" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2940" }, { "source": "secalert@redhat.com", "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/67121" }, { "source": "secalert@redhat.com", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "source": "secalert@redhat.com", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2018:2669" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2019:2995" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/solutions/869353" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665" }, { "source": "secalert@redhat.com", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/BEANUTILS-463" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3Cdev.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3Cuser.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3Cissues.activemq.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3Ccommits.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3Ccommits.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3Cdevnull.infra.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3Cissues.activemq.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3Cdev.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3Cdev.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3Cannounce.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3Ccommits.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3Cgitbox.activemq.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3Cdev.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3Cnotifications.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3Cnotifications.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3Cissues.commons.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3Ccommits.dolphinscheduler.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3Cissues.activemq.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201607-09" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20140911-0001/" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0219.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=140119284401582\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=140801096002766\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=141451023707502\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2014/06/15/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2014/07/08/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/57477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/67121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2018:2669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:2995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/solutions/869353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/BEANUTILS-463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3Cdev.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3Cuser.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3Cissues.activemq.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3Ccommits.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3Ccommits.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3Cdevnull.infra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3Cissues.activemq.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3Cdev.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3Cdev.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3Ccommits.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3Ccommits.pulsar.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3Cgitbox.activemq.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3Cdev.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3Cnotifications.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3Cnotifications.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3Cissues.commons.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3Ccommits.dolphinscheduler.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3Cissues.activemq.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201607-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20140911-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-10 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://struts.apache.org/development/2.x/docs/s2-012.html | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/60082 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=967655 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/development/2.x/docs/s2-012.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/60082 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=967655 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
apache | struts2-showcase | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6FE8E3-A9F4-45E1-B6AB-BEA45495D215", "versionEndExcluding": "2.3.14.1", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts2-showcase:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B5E254-CBC7-47A4-B309-80E40923E9F8", "versionEndIncluding": "2.3.13", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect." }, { "lang": "es", "value": "Apache Struts Showcase App versiones 2.0.0 hasta 2.3.13, como es usado en Struts versiones 2 anteriores a 2.3.14.3, permite a atacantes remotos ejecutar c\u00f3digo OGNL arbitrario por medio de un nombre de par\u00e1metro dise\u00f1ado que no es manejado apropiadamente cuando se invoca un redireccionamiento." } ], "id": "CVE-2013-1965", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-10T19:55:04.683", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-012.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/60082" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/60082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967655" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 1.0 | |
apache | struts | 1.0 | |
apache | struts | 1.0 | |
apache | struts | 1.0 | |
apache | struts | 1.0.1 | |
apache | struts | 1.0.2 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.1 | |
apache | struts | 1.2.0 | |
apache | struts | 1.2.1 | |
apache | struts | 1.2.2 | |
apache | struts | 1.2.3 | |
apache | struts | 1.2.4 | |
apache | struts | 1.2.5 | |
apache | struts | 1.2.6 | |
apache | struts | 1.2.7 | |
apache | struts | 1.2.8 | |
apache | struts | 1.2.9 | |
apache | struts | 1.3.5 | |
apache | struts | 1.3.6 | |
apache | struts | 1.3.7 | |
apache | struts | 1.3.8 | |
apache | struts | 1.3.9 | |
apache | struts | 1.3.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5051228-446E-461D-9B5F-8F765C7BA57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "32FFABC1-74F8-414A-BCC7-7CDC7EB078F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "1239ED60-1581-4FFB-A5FB-4FB898C1EBDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "08266BA4-A365-4187-AC98-230E040B3B8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "709E6CEB-461C-4C6C-A3E9-CC37E3AE9E58", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*", "matchCriteriaId": "93FA9AE3-B453-4FE6-82A9-7DDEF3F6C464", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*", "matchCriteriaId": "A3BB6FBE-469B-4920-A30B-33AD9E41ACCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*", "matchCriteriaId": "34FC82D3-CCAF-4F37-B531-2A9CA17311A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "E0B8B413-8C62-44B6-A382-26F35F4573D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "6309C679-890A-4214-8857-9F119CBBAA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "241A8B39-643B-4371-B629-1636F24DDC97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EE7EF4C-CD6F-4B74-89E3-321706B733FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD882860-03D0-49E9-8CED-DE6663392548", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "95087298-38D2-4ED6-9D99-494AE90F6DE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "15BD4B0B-31A2-4DA3-814A-5C959D1BC64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B2ECF5E1-457F-4E76-81F7-65114DC4E1E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "9C34FDB0-2778-4C36-8345-F7E27509A383", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "CF0302D3-CB8D-4FA7-8F07-C2C7593877BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "8FC3685E-CC47-479D-A418-065ADB38EDD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "805A4E32-2447-49BB-8631-E41DAA221E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "03906D34-F3B3-4C56-A6A6-2F7A10168501", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "91CBFC67-BDD8-4579-843A-F93A2661B032", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "1B3872B7-2972-433D-96A1-154FA545B311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899." }, { "lang": "es", "value": "ActionServlet.java en Apache Struts 1 1.x hasta la versi\u00f3n 1.3.10 no restringe adecuadamente la configuraci\u00f3n Validator, lo que permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) o provocar una denegaci\u00f3n de servicio a trav\u00e9s de una entrada manipulada, un problema relacionado con CVE-2015-0899." } ], "id": "CVE-2016-1182", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:02.880", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN65044642/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91067" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036056" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1182" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Patch" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "vultures@jpcert.or.jp", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN65044642/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks via a crafted request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks via a crafted request." }, { "lang": "es", "value": "Apache Struts 2 2.3.20 hasta la versi\u00f3n 2.3.28.1 permite a atacantes remotos eludir las restricciones destinadas al acceso y llevar a cabo ataques de redirecci\u00f3n a trav\u00e9s de una petici\u00f3n manipulada." } ], "id": "CVE-2016-4433", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:07.537", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "source": "secalert@redhat.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000112" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91282" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348251" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-039.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-13 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "910DCB81-63A8-4BBB-8897-A98A0F2AEEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "F75F4616-4B4B-4CAB-968B-502179152D2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "D3D12A0A-1DC5-47C7-9FF6-E8103C75FE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "C86232DA-90C7-43F8-99CC-C1BFB4BA3F9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D3553904-BF3C-4636-947A-8AA16D4F38A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "E93CE807-D7C2-4865-ACF8-E366A6478B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "12CE716B-867F-49CA-BDAF-194714D990C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "CB6057D5-0787-4026-A202-ACD07C862F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "1B3AE8EA-4D25-4151-A210-ECDE802F8A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "79C615AE-4709-47EB-85F8-BD944096428E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "39047809-4E6D-4670-B9BA-D8FD910E38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "291F3624-8AB5-46F2-9BB5-F592DF1C9F88", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "DD053675-DE5E-40A8-B404-4F36AAC82502", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "B0392E61-6D77-43C3-8009-96BC0F90B8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "0AFA78DD-B60C-46AD-BCCB-4E15BB16BEDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "1DA1EABE-5292-44C2-8327-54201A42F204", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "F327A6EA-69AF-4EB2-8F17-8011678FAB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "603FAA0C-0908-4105-BE3A-016B4A298264", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1A43CA5-46DE-4513-A309-BE3A60CD5489", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "1D83D2FA-8931-45F8-82D6-DE270A2BA55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BAD7A75-378F-4A0F-A10F-E4F7AF60F285", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "56E43496-097F-4560-BFB1-BDDA4659F197", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "03367A87-9011-45F4-B534-DEA26F8D4567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "725DBE04-720B-421E-B76A-4EE92FEE171C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33." }, { "lang": "es", "value": "Cuando se utiliza una funcionalidad de Programaci\u00f3n Orientada a Aspectos (POA) Spring para hacer las acciones Struts seguras, es posible realizar un ataque de DoS. La soluci\u00f3n es actualizar a la versi\u00f3n 2.5.12 o 2.3.33 de Apache Struts." } ], "id": "CVE-2017-9787", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-13T15:29:00.393", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-049.html" }, { "source": "security@apache.org", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99562" }, { "source": "security@apache.org", "url": "http://www.securitytracker.com/id/1039115" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065%40%3Cannouncements.struts.apache.org%3E" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-049.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1039115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065%40%3Cannouncements.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-11-02 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.3.15.3 allow remote attackers to inject arbitrary web script or HTML via the namespace parameter to (1) actionNames.action and (2) showConfig.action in config-browser/.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.3.15.3 allow remote attackers to inject arbitrary web script or HTML via the namespace parameter to (1) actionNames.action and (2) showConfig.action in config-browser/." }, { "lang": "es", "value": "Vulnerabilidades m\u00faltiples de Cross Site Scripting (XSS) en Apache Struts 2.3.15.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de (1) par\u00e1metro de espacio de nombres actionNames.action y (2) showConfig.action en la configuraci\u00f3n del navegador" } ], "id": "CVE-2013-6348", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-11-02T21:55:04.630", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://en.wooyun.org/bugs/wooyun-2013-034?2592" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/99047" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/99048" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/244" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1029266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://en.wooyun.org/bugs/wooyun-2013-034?2592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/99047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/99048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029266" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-07 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ognl_project:ognl:*:*:*:*:*:*:*:*", "matchCriteriaId": "84F96D15-E287-4454-91C4-2B87350518D6", "versionEndIncluding": "3.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors." }, { "lang": "es", "value": "Apache Struts 2.0.0 hasta la versi\u00f3n 2.3.24.1 no cachea correctamente referencias al m\u00e9todo cuando se utiliza con OGNL en versiones anteriores a 3.0.12, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bloqueo de acceso a sitio web) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-3093", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-07T18:59:03.683", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-034.html" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/90961" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036018" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-05 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 | |
apache | struts | 2.2.1 | |
apache | struts | 2.2.1.1 | |
apache | struts | 2.2.3 | |
apache | struts | 2.2.3.1 | |
apache | struts | 2.3.1 | |
apache | struts | 2.3.1.1 | |
apache | struts | 2.3.1.2 | |
apache | struts | 2.3.3 | |
apache | struts | 2.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute." }, { "lang": "es", "value": "El mecanismo de control token en Apache Struts v2.0.0 a trav\u00e9s de v2.3.4 no valida correctamente el par\u00e1metro de configuraci\u00f3n name permitiendo a atacantes remotos realizar ataques de falsificaciones de petici\u00f3n en sitios cruzados (CSRF) estableciendo el par\u00e1metro name de la configuraci\u00f3n simb\u00f3lica a un atributo de sesi\u00f3n" } ], "id": "CVE-2012-4386", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-09-05T23:55:02.663", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50420" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-010.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/55346" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78182" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/WW-3858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/WW-3858" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-10 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://struts.apache.org/development/2.x/docs/s2-013.html | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/60166 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=967656 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://cwiki.apache.org/confluence/display/WW/S2-013 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://struts.apache.org/development/2.x/docs/s2-013.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/60166 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=967656 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cwiki.apache.org/confluence/display/WW/S2-013 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6FE8E3-A9F4-45E1-B6AB-BEA45495D215", "versionEndExcluding": "2.3.14.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag." }, { "lang": "es", "value": "Apache Struts versiones 2 anteriores a 2.3.14.2, permite a atacantes remotos ejecutar c\u00f3digo OGNL arbitrario por medio de una petici\u00f3n dise\u00f1ada que no es manejada apropiadamente cuando usa el atributo includeParams en la etiqueta (1) URL o (2) A." } ], "id": "CVE-2013-1966", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-10T19:55:04.713", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-013.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60166" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/60166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-013" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-08-22 13:29
Modified
2025-03-13 21:01
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.
References
Impacted products
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "688F84A7-B698-4343-9F7B-FD68B2218035", "versionEndExcluding": "2.3.35", "versionStartIncluding": "2.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D66D46C-389B-4C37-9EEE-6301774719FA", "versionEndExcluding": "2.5.17", "versionStartIncluding": "2.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E8AF73E-8AC6-4F65-A6F0-DBB2CC7A613F", "versionEndExcluding": "12.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A94B32D-6B5F-4E42-8345-4F9126A89435", "versionEndIncluding": "3.4.9.4237", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF71D94F-EFC5-4390-A380-AC0E5DB05516", "versionEndIncluding": "4.0.6.5281", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "33EFAF19-A639-47AD-9CDC-D174C91F0F00", "versionEndIncluding": "8.0.2.8191", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn\u0027t have value and action set and in same time, its upper package have no or wildcard namespace." }, { "lang": "es", "value": "Apache Struts, desde la versi\u00f3n 2.3 hasta la 2.3.34 y desde la versi\u00f3n 2.5 hasta la 2.5.16, sufre de una posible ejecuci\u00f3n remota de c\u00f3digo cuando el valor de alwaysSelectFullNamespace es \"true\" (establecido por el usuario o por un plugin como Convention Plugin). Adem\u00e1s, los resultados se emplean sin ning\u00fan espacio de nombres y, al mismo tiempo, el paquete superior no tiene espacio de nombres o contiene caracteres comod\u00edn. De manera similar a como pasa con los resultados, existe la misma posibilidad al emplear la etiqueta url, que no tiene un valor y acci\u00f3n definidos y, adem\u00e1s, su paquete superior no tiene espacio de nombres o contiene caracteres comod\u00edn." } ], "id": "CVE-2018-11776", "lastModified": "2025-03-13T21:01:25.353", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-08-22T13:29:00.753", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory", "Broken Link" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105125" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041547" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041888" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-057" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hook-s3c/CVE-2018-11776-Python-PoC" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2018-11776" }, { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180822-0001/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20181018-0002/" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45260/" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45262/" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45367/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory", "Broken Link" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hook-s3c/CVE-2018-11776-Python-PoC" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2018-11776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180822-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20181018-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45260/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45262/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45367/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-13 15:29
Modified
2025-04-20 01:37
Severity ?
Summary
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A4F914BA-CF16-4B03-A6A2-8C9816EC1248", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C82970-62C9-4513-A66D-6BDA4048C27F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D284BF2-101C-490C-85CB-69D156D1FF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "96C720D6-312B-477C-A993-BEE39A7ADB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "CF635DCE-D495-4166-9E25-1E48DDDF9AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "725DBE04-720B-421E-B76A-4EE92FEE171C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12." }, { "lang": "es", "value": "Si una aplicaci\u00f3n permite la introducci\u00f3n de una URL en un campo de un formulario y se emplea URLValidator (integrado), es posible preparar una URL especial que ser\u00e1 utilizada para sobrecargar el proceso del servidor cuando se lleva a cabo la validaci\u00f3n de la URL. La soluci\u00f3n es actualizar a la versi\u00f3n 2.5.12 de Apache Struts." } ], "id": "CVE-2017-7672", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-13T15:29:00.363", "references": [ { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-047.html" }, { "source": "security@apache.org", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99563" }, { "source": "security@apache.org", "url": "http://www.securitytracker.com/id/1039114" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-047.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1039114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-23 14:19
Modified
2025-04-09 00:30
Severity ?
Summary
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
opensymphony | xwork | 2.0.0 | |
opensymphony | xwork | 2.0.1 | |
opensymphony | xwork | 2.0.2 | |
opensymphony | xwork | 2.0.3 | |
opensymphony | xwork | 2.0.4 | |
opensymphony | xwork | 2.0.5 | |
opensymphony | xwork | 2.1.0 | |
opensymphony | xwork | 2.1.1 | |
apache | struts | 2.0.0 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FDB359E4-7D59-4124-855D-8E9CF71554CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF27EEA-B36A-4FA1-BC8F-37003457FD53", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9ABB7703-3606-4983-ADCE-829A3291ED66", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "89891ADF-86DD-4921-81CA-8482FA6AD156", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "00DB2D6F-008C-4132-B7A5-86366AE4C551", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A1AC722-E97E-4EA2-A6F6-9C6EED5131E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "318A2710-854A-44BB-8A9D-C5C360BC48E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensymphony:xwork:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "32976658-0BE5-42E2-A466-7CB9FF5ABF40", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character." }, { "lang": "es", "value": "ParametersInterceptor en OpenSymphony XWork 2.0.x antes de 2.0.6 y 2.1.x antes de 2.1.2, tal como se utiliza en Apache Struts y otros productos, no restringe adecuadamente las referencias # (almohadilla) a objetos de contexto, lo que permite a atacantes remotos ejecutar sentencias OGNL (Object-Graph Navigation Language) y modificar los objetos del contexto del lado del servidor contexto objetos, como lo demuestra el uso de una representaci\u00f3n \\u0023 del car\u00e1cter #." } ], "id": "CVE-2008-6504", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-23T14:19:12.407", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://fisheye6.atlassian.com/cru/CR-9/" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://issues.apache.org/struts/browse/WW-2692" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://jira.opensymphony.com/browse/XW-641" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/49732" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32495" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32497" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://struts.apache.org/2.x/docs/s2-003.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32101" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3004" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://fisheye6.atlassian.com/cru/CR-9/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://issues.apache.org/struts/browse/WW-2692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://jira.opensymphony.com/browse/XW-641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/49732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://struts.apache.org/2.x/docs/s2-003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-25 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF970548-1E46-42E7-8323-4C9FF7A778F6", "versionEndIncluding": "2.3.16.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20." }, { "lang": "es", "value": "Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) en Apache Struts en versiones anteriores a 2.3.20." } ], "id": "CVE-2015-5169", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-25T21:29:00.303", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN95989300/index.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000125.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76625" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN95989300/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000125.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/76625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-025.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression." }, { "lang": "es", "value": "El plugin REST en Apache Struts versiones 2 2.3.19 hasta 2.3.28.1, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una expresi\u00f3n especialmente dise\u00f1ada." } ], "id": "CVE-2016-4438", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:09.100", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN07710476/index.html" }, { "source": "secalert@redhat.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/91275" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348238" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN07710476/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/91275" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-037.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-09 15:08
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:novell:suse_linux:11:-:enterprise:*:*:*:*:*", "matchCriteriaId": "BB545D91-1C4C-4692-B01A-B8DAE4A958BE", "vulnerable": false }, { "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3", "vulnerable": false }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509", "vulnerable": false }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to \"insufficient quoting of parameters.\"" }, { "lang": "es", "value": "Vulnerabilidades de secuencias de comandos en sitios cruzados (XSS)en Apache Struts anteriores a v1.2.9-162.31.1 en SUSE Linux Enterprise (SLE) v11, anteriores a v1.2.9-108.2 en SUSE openSUSE v10.3, anteriores a v1.2.9-198.2 en SUSE openSUSE v11.0, y anteriores a v1.2.9-162.163.2 en SUSE openSUSE v11.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no espec\u00edficos, relativo a \"Citando la insuficiencia de par\u00e1metros.\" \r\n" } ], "id": "CVE-2008-2025", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-09T15:08:35.483", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/53380" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34567" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34642" }, { "source": "cve@mitre.org", "url": "http://support.novell.com/security/cve/CVE-2008-2025.html" }, { "source": "cve@mitre.org", "url": "https://bugzilla.novell.com/show_bug.cgi?id=385273" }, { "source": "cve@mitre.org", "url": "https://launchpad.net/bugs/cve/2008-2025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/53380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.novell.com/security/cve/CVE-2008-2025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=385273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://launchpad.net/bugs/cve/2008-2025" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This is not a security flaw in Struts. Struts has never guaranteed to perform filtering of the untrusted user inputs used as html tag attributes names or values. If user inputs need to be used as part of the tag attributes, the JSP page needs to perform filtering explicitly. For further details, see: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2025", "lastModified": "2009-10-20T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-11 13:00
Modified
2025-04-12 10:46
Severity ?
Summary
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "96319FC9-4E50-4B46-B2B1-16248275B717", "versionEndExcluding": "2.3.16.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to \"manipulate\" the ClassLoader via the class parameter, which is passed to the getClass method." }, { "lang": "es", "value": "ParametersInterceptor en Apache Struts versiones anteriores a 2.3.16.2, permite a atacantes remotos \"manipulate\" el ClassLoader por medio del par\u00e1metro class, que se pasa al m\u00e9todo getClass." } ], "id": "CVE-2014-0094", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-11T13:00:37.107", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56440" }, { "source": "secalert@redhat.com", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59178" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-020.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.konakart.com/downloads/ver-7-3-0-0-whats-new" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531362/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65999" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029876" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://secunia.com/advisories/59178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.konakart.com/downloads/ver-7-3-0-0-whats-new" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/531362/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-14 08:15
Modified
2025-02-13 17:16
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "D75F74D6-E223-41BA-86B4-5BADF2B48692", "versionEndExcluding": "2.5.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "158CD586-162F-41A6-97B5-62D5F59B656E", "versionEndExcluding": "6.1.2.1", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.\n\nUpgrade to Struts 2.5.31 or 6.1.2.1 or greater" } ], "id": "CVE-2023-34396", "lastModified": "2025-02-13T17:16:36.117", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security@apache.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-14T08:15:09.520", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/14/3" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-064" }, { "source": "security@apache.org", "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/14/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "security@apache.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-08 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
References
{ "cisaActionDue": "2022-07-21", "cisaExploitAdd": "2022-01-21", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts 2 Improper Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C1AD19-84EE-48CD-9A3E-F168B48636C0", "versionEndExcluding": "2.2.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter." }, { "lang": "es", "value": "El componente ExceptionDelegator en Apache Struts antes de v2.2.3.1 interpreta los valores de los par\u00e1metros como expresiones OGNL durante el manejo de determinadas excepciones en tipos de datos de propiedades no coincidentes, lo que permite a atacantes remotos ejecutar c\u00f3digo Java a trav\u00e9s de un par\u00e1metro especificamente modificado para tal fin." } ], "id": "CVE-2012-0391", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2012-01-08T15:55:01.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47393" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Broken Link" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Broken Link" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Broken Link" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2012-01-08 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BF4C0BB-6B6B-410B-BE2C-14C7282D775B", "versionEndExcluding": "2.3.1.1", "versionStartIncluding": "2.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object." }, { "lang": "es", "value": "El componente ParameterInterceptor en Apache Struts antes de la versi\u00f3n v2.3.1.1 no impide el acceso a los constructores p\u00fablicos, lo que permite a atacantes remotos crear o sobreescribir archivos de su elecci\u00f3n a trav\u00e9s de un par\u00e1metro debidamente modificado que desencadena la creaci\u00f3n de un objeto Java." } ], "id": "CVE-2012-0393", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-08T15:55:01.420", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/47393" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/47393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-20 03:37
Modified
2025-04-11 00:51
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
Impacted products
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Improper Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A10FB76-761D-4411-B6A8-B1AD5C133071", "versionEndExcluding": "1.3.8", "versionStartIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2:-:*:*:*:*:*:*", "matchCriteriaId": "F0E0751C-E0BD-4C33-A541-C6FC67CE6663", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCCF9A1C-7091-4D72-8AFC-5373F45FF7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "61C63F76-5AFE-4D2F-B81C-D3476C165227", "versionEndIncluding": "2.3.15", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D24308C-EEFB-477D-A88C-95E76CAC8AD7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D0C7AB6-1B62-49E3-99F8-53DD9329264E", "versionEndIncluding": "6.10", "versionStartIncluding": "5.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "2825C5B3-6495-43FE-9D87-750C8B9B25EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3527F41-A6ED-437D-9833-458A2C60C2A3", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "matchCriteriaId": "32623D48-7000-4C7D-823F-7D2A9841D88C", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": false }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D0C7AB6-1B62-49E3-99F8-53DD9329264E", "versionEndIncluding": "6.10", "versionStartIncluding": "5.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp7000f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "577FACF4-0FB9-461A-877C-32DA8DBBF2B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp7000f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D55A60A2-B9F8-49CF-AD55-033942363704", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:primepower_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5392609-A095-40AA-8190-783B8CCFDB18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:primepower:-:*:*:*:*:*:*:*", "matchCriteriaId": "77300584-CABF-4332-8E1A-763048496818", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "931139C5-A9D3-4D63-AF15-B0C5DD0578D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "855CDB9B-5476-4765-A8E3-69C7D42E1DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:primergy_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78239AD8-F1E1-49F2-A89F-F8488F21C014", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:primergy:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9091D4-FC2B-43DE-A8C5-87922034536F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:gp5000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "262CD533-5171-4AB0-9537-65FC5FBA195E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:gp5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3BE416-DA1B-4168-BE30-DFE3CD84E4E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:sparc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3177688-5BBE-4C19-8A5C-FCF76AE2B227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:sparc:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E1A333-794C-44BE-9E2A-C6711169681E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "109A2A5D-D631-472F-AA80-2E1D707943F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51D5BAC9-E5B1-4A19-8B87-0CA2FA046D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F0DBE55-667B-45EF-8C3A-9C7AA33ADDE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix." }, { "lang": "es", "value": "Apache Struts v2.0.0 hasta v2.3.15 permite a atacantes remotos ejecutar expresiones OGNL arbitrarias mediante un par\u00e1metro con una (1)acci\u00f3n:, (2) redirect:, o (3) redirectAction:" } ], "id": "CVE-2013-2251", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2013-07-20T03:37:30.737", "references": [ { "source": "secalert@redhat.com", "tags": [ "Product" ], "url": "http://archiva.apache.org/security.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://osvdb.org/98445" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/61189" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029184" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032916" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://archiva.apache.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/98445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/61189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-10 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable \u003cs:token/\u003e values, which allows remote attackers to bypass the CSRF protection mechanism." }, { "lang": "es", "value": "Apache Struts 2.0.0 hasta 2.3.x anterior a 2.3.20 utiliza valores previsibles, lo que permite a atacantes remotos evadir el mecanismo de protecci\u00f3n CSRF." } ], "id": "CVE-2014-7809", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-12-10T15:59:01.347", "references": [ { "source": "secalert@redhat.com", "url": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-023.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/534175/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/71548" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1031309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534175/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031309" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-16 01:15
Modified
2025-05-23 16:53
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Summary
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
xstream | xstream | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EB036B6-1387-49B0-95B2-9C954EAC9DD9", "versionEndExcluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:*", "matchCriteriaId": "EED822AC-DE77-4E76-A454-95C13370BB5A", "versionEndExcluding": "1.4.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories." }, { "lang": "es", "value": "XStream es una biblioteca de Java para serializar objetos a XML y viceversa.\u0026#xa0;En XStream versiones anteriores a 1.4.15, puede ser activada una vulnerabilidad de tipo Server-Side Forgery Request al desagrupar.\u0026#xa0;La vulnerabilidad puede permitir a un atacante remoto solicitar datos de recursos internos que no est\u00e1n disponibles p\u00fablicamente solo mediante la manipulaci\u00f3n del flujo de entrada procesado.\u0026#xa0;Si conf\u00eda en la lista negra predeterminada de XStream del Security Framework, tendr\u00e1 que usar al menos la versi\u00f3n 1.4.15.\u0026#xa0;La vulnerabilidad reportada no existe si se ejecuta Java versi\u00f3n 15 o superior. Ning\u00fan usuario es afectado si sigui\u00f3 la recomendaci\u00f3n de configurar el Security Framework de XStream con una lista blanca!\u0026#xa0;Cualquiera que conf\u00ede en la lista negra predeterminada de XStream puede cambiar inmediatamente a una lista blanca para los tipos permitidos para evitar la vulnerabilidad.\u0026#xa0;Usuarios de XStream 1.4 o por debajo, quienes a\u00fan quieran usar la lista negra predeterminada de XStream pueden usar una soluci\u00f3n alternativa que se describe con m\u00e1s detalle en los avisos a los que se hace referencia" } ], "id": "CVE-2020-26258", "lastModified": "2025-05-23T16:53:23.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-16T01:15:12.333", "references": [ { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://x-stream.github.io/CVE-2020-26258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://x-stream.github.io/CVE-2020-26258.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-12 16:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEE2D92E-A527-469A-89A9-9685D8E08650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2_beta:*:*:*:*:*:*:*", "matchCriteriaId": "A4275EB1-8AD1-4CB2-BC19-8F279BFA8D59", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB525941-7175-43C1-9F17-814F5F7C72CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "F10D559E-04A0-4002-947C-D3902138795B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "89203DD8-2C95-4546-9504-83654FFA5DBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "EB3D5644-CFAC-4FB5-A1FB-387F97876098", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "1225A0B0-C3F2-4579-BFE9-F8DB2CF596F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "8DC883A7-0766-4857-ABC8-9DB4BA713650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display." }, { "lang": "es", "value": "Apache Struts 2.x en versiones anteriores a 2.3.25 no sanitiza el texto en el objeto Locale constru\u00eddo por I18NInterceptor, lo que podr\u00eda permitir a atacantes remotos llevar a cabo ataques de XSS a trav\u00e9s de vectores no especificados que implican la visualizaci\u00f3n de idioma." } ], "id": "CVE-2016-2162", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-12T16:59:01.203", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-030.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/85070" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1035272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/85070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035272" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "63CE1226-E0E6-4DC6-AC89-3FFDE6BD7B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "E17D62B8-349B-4F30-8849-6912828802C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "D5E91133-D585-43F7-9093-94D735B3167E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "DD44FD72-ECE7-4E08-AD9E-5CE2C310C2C8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field." }, { "lang": "es", "value": "La clase URLValidator en Apache Struts 2 2.3.20 hasta la versi\u00f3n 2.3.28.1 y 2.5.x en versiones anteriores a 2.5.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un valor nulo para un campo URL." } ], "id": "CVE-2016-4465", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:10.117", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN12352818/index.html" }, { "source": "secalert@redhat.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000114" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91278" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348253" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN12352818/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91278" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-041.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-09-05 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.0 | |
apache | struts | 2.0.1 | |
apache | struts | 2.0.2 | |
apache | struts | 2.0.3 | |
apache | struts | 2.0.4 | |
apache | struts | 2.0.5 | |
apache | struts | 2.0.6 | |
apache | struts | 2.0.7 | |
apache | struts | 2.0.8 | |
apache | struts | 2.0.9 | |
apache | struts | 2.0.10 | |
apache | struts | 2.0.11 | |
apache | struts | 2.0.11.1 | |
apache | struts | 2.0.11.2 | |
apache | struts | 2.0.12 | |
apache | struts | 2.0.13 | |
apache | struts | 2.0.14 | |
apache | struts | 2.1.0 | |
apache | struts | 2.1.1 | |
apache | struts | 2.1.2 | |
apache | struts | 2.1.3 | |
apache | struts | 2.1.4 | |
apache | struts | 2.1.5 | |
apache | struts | 2.1.6 | |
apache | struts | 2.1.8 | |
apache | struts | 2.1.8.1 | |
apache | struts | 2.2.1 | |
apache | struts | 2.2.1.1 | |
apache | struts | 2.2.3 | |
apache | struts | 2.2.3.1 | |
apache | struts | 2.3.1 | |
apache | struts | 2.3.1.1 | |
apache | struts | 2.3.1.2 | |
apache | struts | 2.3.3 | |
apache | struts | 2.3.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression." }, { "lang": "es", "value": "Apache Struts v2.0.0 a trav\u00e9s de v2.3.4 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un nombre de par\u00e1metro largo, que se procesa como una expresi\u00f3n OGNL ..." } ], "id": "CVE-2012-4387", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-05T23:55:02.710", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50420" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-011.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/55346" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78183" }, { "source": "secalert@redhat.com", "url": "https://issues.apache.org/jira/browse/WW-3860" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/jira/browse/WW-3860" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-12 16:15
Modified
2024-11-21 06:06
Severity ?
Summary
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.openwall.com/lists/oss-security/2022/04/12/6 | Mailing List, Mitigation, Third Party Advisory | |
security@apache.org | https://cwiki.apache.org/confluence/display/WW/S2-062 | Mitigation, Patch, Vendor Advisory | |
security@apache.org | https://security.netapp.com/advisory/ntap-20220420-0001/ | Third Party Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpujul2022.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/04/12/6 | Mailing List, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cwiki.apache.org/confluence/display/WW/S2-062 | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220420-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "24A8DF7C-82D9-4D56-AAE7-5D1DEB1CD558", "versionEndIncluding": "2.5.29", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag\u2019s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation." }, { "lang": "es", "value": "La correcci\u00f3n emitida para CVE-2020-17530 era incompleta. As\u00ed, desde Apache Struts versiones 2.0.0 hasta 2.5.29, todav\u00eda algunos de los atributos de las etiquetas pod\u00edan llevar a cabo una doble evaluaci\u00f3n si un desarrollador aplicaba la evaluaci\u00f3n OGNL forzada usando la sintaxis %{...}. El uso de la evaluaci\u00f3n forzada de OGNL en entradas de usuario no confiables puede conllevar a una Ejecuci\u00f3n de C\u00f3digo Remota y una degradaci\u00f3n de la seguridad" } ], "id": "CVE-2021-31805", "lastModified": "2024-11-21T06:06:15.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-12T16:15:08.133", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-062" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-917" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-917" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-09 15:08
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) " (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEE2D92E-A527-469A-89A9-9685D8E08650", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) \" (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Apache Struts v2.0.x anteriores a v2.0.11.1 y v2.1.x anteriores a v2.1.1 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores asociados con el manejo no adecuado de (1) \" (comillas doble) en el atributo href en una etiqueta s:a, y (2) par\u00e1metros en el atributo acci\u00f3n de una etiqueta s:url.\r\n" } ], "id": "CVE-2008-6682", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-09T15:08:35.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34686" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/WW-2414" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/WW-2427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/WW-2414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/WW-2427" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-11 02:59
Modified
2025-04-20 01:37
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
apache | struts | * | |
ibm | storwize_v3500_firmware | 7.7.1.6 | |
ibm | storwize_v3500_firmware | 7.8.1.0 | |
ibm | storwize_v3500 | - | |
ibm | storwize_v5000_firmware | 7.7.1.6 | |
ibm | storwize_v5000_firmware | 7.8.1.0 | |
ibm | storwize_v5000 | - | |
ibm | storwize_v7000_firmware | 7.7.1.6 | |
ibm | storwize_v7000_firmware | 7.8.1.0 | |
ibm | storwize_v7000 | - | |
lenovo | storage_v5030_firmware | 7.7.1.6 | |
lenovo | storage_v5030_firmware | 7.8.1.0 | |
lenovo | storage_v5030 | - | |
hp | server_automation | 9.1.0 | |
hp | server_automation | 10.0.0 | |
hp | server_automation | 10.1.0 | |
hp | server_automation | 10.2.0 | |
hp | server_automation | 10.5.0 | |
oracle | weblogic_server | 10.3.6.0.0 | |
oracle | weblogic_server | 12.1.3.0.0 | |
oracle | weblogic_server | 12.2.1.1.0 | |
oracle | weblogic_server | 12.2.1.2.0 | |
arubanetworks | clearpass_policy_manager | * | |
netapp | oncommand_balance | - |
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Apache Struts Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D3EE72-E37F-4F4C-996D-50E144CF43DD", "versionEndExcluding": "2.3.32", "versionStartIncluding": "2.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2F63D06-B26A-4DB6-8B07-B847554ABCA8", "versionEndExcluding": "2.5.10.1", "versionStartIncluding": "2.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:7.7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5AB119E1-7736-4C99-AD9C-9E8820769D4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:7.8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8A0C06E-B833-4A52-B1F0-FEC9BEF372A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:7.7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F445D22E-8976-4ADC-81FD-49B351B2802A", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:7.8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B9E6724-8796-4DD5-9CE2-8E602DA893F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:7.7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D1D7A801-1861-4479-9367-60F792BF8016", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:7.8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDF96E49-9530-4718-B5A9-7366D10CC890", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:lenovo:storage_v5030_firmware:7.7.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "371CD28E-6187-4EB1-8B73-645F7A6BFFD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:lenovo:storage_v5030_firmware:7.8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA0AFFAA-F7AE-416C-A40D-24F972EE18BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:lenovo:storage_v5030:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2A4179B-51C5-486B-8CFF-D49436D60910", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:server_automation:9.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "112DFE68-A609-4B76-8227-4DE9CAC25F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:server_automation:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "951C042F-9C83-4DBB-8070-A926A1B46591", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:server_automation:10.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AC9404A4-6B73-436E-A8FB-914530D6000A", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:server_automation:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "32AFBE84-5394-49A1-844A-ED964A46ACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:server_automation:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "38ABFD4F-8E97-4418-A921-BF9F4D95A4A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B40B13B7-68B3-4510-968C-6A730EB46462", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C93CC705-1F8C-4870-99E6-14BF264C3811", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "29F4C533-DE42-463B-9D80-5D4C85BF1A5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "3A1728D5-E03B-49A0-849C-B722197AF054", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D1193B0-59C9-4AC0-BBA0-CED6FCC91883", "versionEndExcluding": "6.6.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string." }, { "lang": "es", "value": "El analizador sint\u00e1ctico Jakarta Multipart en Apache Struts 2 en versiones 2.3.x anteriores a la 2.3.32 y versiones 2.5.x anteriores a la 2.5.10.1 no maneja correctamente las excepciones y la generaci\u00f3n de mensajes de error, lo que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de una cadena #cmd= en un encabezado HTTP de Content-Type, Content-Disposition o Content-Length manipulado." } ], "id": "CVE-2017-5638", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2017-03-11T02:59:00.150", "references": [ { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "source": "security@apache.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96729" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037973" }, { "source": "security@apache.org", "tags": [ "Exploit", "Press/Media Coverage" ], "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://exploit-db.com/exploits/41570" }, { "source": "security@apache.org", "tags": [ "Broken Link" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "source": "security@apache.org", "tags": [ "Broken Link" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "source": "security@apache.org", "tags": [ "Exploit" ], "url": "https://github.com/mazen160/struts-pwn" }, { "source": "security@apache.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "source": "security@apache.org", "tags": [ "Broken Link" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://isc.sans.edu/diary/22169" }, { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-045.html" }, { "source": "security@apache.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-046.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://twitter.com/theog150/status/841146956135124993" }, { "source": "security@apache.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41614/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/834067" }, { "source": "security@apache.org", "tags": [ "Broken Link" ], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage" ], "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://exploit-db.com/exploits/41570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/mazen160/struts-pwn" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://isc.sans.edu/diary/22169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://twitter.com/theog150/status/841146956135124993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41614/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/834067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-09 15:08
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | 2.0.9 | |
dojotoolkit | dojo | 0.4.1 | |
dojotoolkit | dojo | 0.4.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:dojotoolkit:dojo:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "528A98A5-751F-40F1-9AF7-0CB84D0E154A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dojotoolkit:dojo:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DA636E72-459D-44A8-8278-4E5091975D25", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) \r\nDojo v0.4.1 y v0.4.2, como el utilizado en Apache Struts y otros productos, permite a atacantes remotos inyectar web script o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados inplicando a (1) xip_client.html y (2) xip_server.html en src/io/. \r\n" } ], "id": "CVE-2007-6726", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-09T15:08:35.453", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dojotoolkit.org/releaseNotes/0.4.3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34660" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49884" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/WW-2134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dojotoolkit.org/releaseNotes/0.4.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://issues.apache.org/struts/browse/WW-2134" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-23 14:19
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.1.2_beta:*:*:*:*:*:*:*", "matchCriteriaId": "A4275EB1-8AD1-4CB2-BC19-8F279BFA8D59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en Apache Struts v2.0.x anteriores a v2.0.12 y v2.1.x anteriores a v2.1.3, permite a atacantes remotos leer ficheros de su elecci\u00f3n a trav\u00e9s de ..%25f (punto punto barra, codificado) en una direcci\u00f3n Web con /struts/ path, relativo a (1) FilterDispatcher en v2.0.x y (2)DefaultStaticContentLoader en v2.1.x.\r\n" } ], "id": "CVE-2008-6505", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-03-23T14:19:12.453", "references": [ { "source": "cve@mitre.org", "url": "http://issues.apache.org/struts/browse/WW-2779" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/49733" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/49734" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32497" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-004.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/32104" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://issues.apache.org/struts/browse/WW-2779" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/49733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/49734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/2.x/docs/s2-004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/32104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/3003" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-16 01:15
Modified
2025-05-23 16:54
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
6.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
Summary
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
xstream | xstream | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
fedoraproject | fedora | 33 | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EB036B6-1387-49B0-95B2-9C954EAC9DD9", "versionEndExcluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xstream:xstream:*:*:*:*:*:*:*:*", "matchCriteriaId": "EED822AC-DE77-4E76-A454-95C13370BB5A", "versionEndExcluding": "1.4.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories." }, { "lang": "es", "value": "XStream es una biblioteca de Java para serializar objetos a XML y viceversa.\u0026#xa0;En XStream versiones anteriores a 1.4.15, es vulnerable a una Eliminaci\u00f3n Arbitraria de Archivos en el host local al desagrupar.\u0026#xa0;La vulnerabilidad puede permitir a un atacante remoto eliminar archivos conocidos arbitrarios en el host como registro, ya que el proceso en ejecuci\u00f3n posee derechos suficientes solo mediante la manipulaci\u00f3n del flujo de entrada procesado.\u0026#xa0;Si conf\u00eda en la lista negra predeterminada de XStream del Security Framework, tendr\u00e1 que usar al menos la versi\u00f3n 1.4.15.\u0026#xa0;La vulnerabilidad reportada no se presenta al ejecutar Java versi\u00f3n 15 o superior.\u0026#xa0;Ning\u00fan usuario est\u00e1 afectado, si sigui\u00f3 la recomendaci\u00f3n de configurar el Security Framework de XStream con una lista blanca!\u0026#xa0;Cualquiera que conf\u00ede en la lista negra predeterminada de XStream puede cambiar inmediatamente a una lista blanca para los tipos permitidos para evitar la vulnerabilidad.\u0026#xa0;Usuarios de XStream 1.4 o por debajo, quienes a\u00fan quieran usar la lista negra predeterminada de XStream pueden usar una soluci\u00f3n alternativa que se describe con m\u00e1s detalle en los avisos a los que se hace referencia" } ], "id": "CVE-2020-26259", "lastModified": "2025-05-23T16:54:02.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-16T01:15:12.413", "references": [ { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://x-stream.github.io/CVE-2020-26259.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://x-stream.github.io/CVE-2020-26259.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-07-04 22:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2 2.3.20 through 2.3.28.1 mishandles token validation, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "880AEA69-3705-447D-80FF-60753248158F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "71823E13-1896-4EE4-A49C-CFFB717FFD80", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "067F6249-CC5A-4402-843C-06D5F9F77267", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 mishandles token validation, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unspecified vectors." }, { "lang": "es", "value": "Apache Struts 2 2.3.20 hasta la versi\u00f3n 2.3.28.1 no maneja adecuadamente la validaci\u00f3n del token, lo que permite a atacantes remotos llevar a cabo ataques CSRF a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2016-4430", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-04T22:59:05.337", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "source": "secalert@redhat.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000111" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/91281" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348249" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-038.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-06-07 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D1467BC-9BC8-402D-A420-615CF9698648", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "524C5119-416D-413B-BF1D-29291E23FDB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "45446B16-F531-4C6D-B889-A8A6622C70A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C778ADED-75B5-4AD3-8CDC-EFDFFAD5A742", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin." }, { "lang": "es", "value": "Apache Struts versiones 2.3.19 hasta 2.3.20.2, versiones 2.3.21 hasta 2.3.24.1 y versiones 2.3.25 hasta 2.3.28, cuando Dynamic Method Invocation est\u00e1 habilitado, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de vectores relacionados con un operador ! (signo de exclamaci\u00f3n) en el Plugin REST." } ], "id": "CVE-2016-3087", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-07T18:59:02.713", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-033.html" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/90960" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1036017" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/39919/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/docs/s2-033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/90960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/39919/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-16 18:55
Modified
2025-04-11 00:51
Severity ?
Summary
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E131A64-B846-4751-BF3E-C697A90C49E7", "versionEndExcluding": "2.3.14.3", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both \"${}\" and \"%{}\" sequences, which causes the OGNL code to be evaluated twice." }, { "lang": "es", "value": "Apache Struts 2 anterior a v2.3.14.3 permite a atacantes remotos ejecutar c\u00f3digo OGNL arbitrario mediante una solicitud con un valor especialmente dise\u00f1ado que contiene las secuencias \"${}\" y \"%{}\", lo que produce que el c\u00f3digo OGNL sea evaluado dos veces." } ], "id": "CVE-2013-2135", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-16T18:55:01.403", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/64758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-12-11 16:15
Modified
2025-07-15 16:30
Severity ?
Summary
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://cwiki.apache.org/confluence/display/WW/S2-067 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250103-0005/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAB5D8EE-6237-4CB6-B363-E1B6982E44EE", "versionEndExcluding": "6.4.0", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067" }, { "lang": "es", "value": "La l\u00f3gica de carga de archivos es una vulnerabilidad defectuosa en Apache Struts. Este problema afecta a Apache Struts: desde la versi\u00f3n 2.0.0 hasta la 6.4.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.4.0, que soluciona el problema. Puede encontrar m\u00e1s detalles en https://cwiki.apache.org/confluence/display/WW/S2-067" } ], "id": "CVE-2024-53677", "lastModified": "2025-07-15T16:30:19.423", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "YES", "Recovery": "AUTOMATIC", "Safety": "NEGLIGIBLE", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 9.5, "baseSeverity": "CRITICAL", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "RED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Red", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "LOW" }, "source": "security@apache.org", "type": "Secondary" } ] }, "published": "2024-12-11T16:15:14.593", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250103-0005/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-14 17:15
Modified
2024-11-21 04:16
Severity ?
Summary
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | struts | * | |
oracle | communications_policy_management | 12.5.0 | |
oracle | financial_services_data_integration_hub | 8.0.3 | |
oracle | financial_services_data_integration_hub | 8.0.6 | |
oracle | financial_services_market_risk_measurement_and_management | 8.0.6 | |
oracle | mysql_enterprise_monitor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*", "matchCriteriaId": "A38218D5-0245-4ECE-8215-DEFEAB975689", "versionEndIncluding": "2.5.20", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "5312AC7A-3C16-4967-ACA6-317289A749D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "25B0D39E-A630-4C85-AF90-396FB3E0FE7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "987A0C35-4C7F-4FFB-B47B-37B69A32F879", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D5112-4055-4F89-A5B3-0DCB109481B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "matchCriteriaId": "F48F2267-61EA-4F12-ADE9-85CB6F6B290E", "versionEndIncluding": "8.0.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload." }, { "lang": "es", "value": "Una anulaci\u00f3n del permiso de acceso en Apache Struts versiones 2.0.0 hasta 2.5.20, puede causar una Denegaci\u00f3n de Servicio al llevar a cabo una carga de archivo" } ], "id": "CVE-2019-0233", "lastModified": "2024-11-21T04:16:33.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-14T17:15:09.980", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-060" }, { "source": "security@apache.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-16 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to "compromise internal state of an application" via unspecified vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "22FF6282-0BCA-46EB-9648-6EE3EDA189F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to \"compromise internal state of an application\" via unspecified vectors." }, { "lang": "es", "value": "Los patrones de exclusi\u00f3n por defecto (par\u00e1metros de exclusi\u00f3n) en Apache Struts 2.3.20 permiten a atacantes remotos \u0027comprometer el estado interno de una aplicaci\u00f3n\u0027 a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2015-1831", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-16T14:59:00.073", "references": [ { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/75940" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1032985" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://struts.apache.org/docs/s2-024.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2017-9787 (GCVE-0-2017-9787)
Vulnerability from cvelistv5
Published
2017-07-13 15:00
Modified
2024-09-17 02:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- DoS Attack
Summary
When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3.x prior to 2.3.33 Version: 2.5 to 2.5.10.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "1039115", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039115" }, { "name": "[announcements] 20170810 [ANN] Apache Struts: S2-049 Security Bulletin update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065%40%3Cannouncements.struts.apache.org%3E" }, { "name": "99562", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99562" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-049.html" }, { "name": "[announcements] 20170713 Apache Struts 2.5.12 GA with Security Fixes Release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3.x prior to 2.3.33" }, { "status": "affected", "version": "2.5 to 2.5.10.1" } ] } ], "datePublic": "2017-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS Attack", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-07T09:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "1039115", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039115" }, { "name": "[announcements] 20170810 [ANN] Apache Struts: S2-049 Security Bulletin update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065%40%3Cannouncements.struts.apache.org%3E" }, { "name": "99562", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99562" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-049.html" }, { "name": "[announcements] 20170713 Apache Struts 2.5.12 GA with Security Fixes Release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-07-13T00:00:00", "ID": "CVE-2017-9787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.3.x prior to 2.3.33" }, { "version_value": "2.5 to 2.5.10.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS Attack" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "1039115", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039115" }, { "name": "[announcements] 20170810 [ANN] Apache Struts: S2-049 Security Bulletin update", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065@%3Cannouncements.struts.apache.org%3E" }, { "name": "99562", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99562" }, { "name": "https://security.netapp.com/advisory/ntap-20180706-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "name": "http://struts.apache.org/docs/s2-049.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-049.html" }, { "name": "[announcements] 20170713 Apache Struts 2.5.12 GA with Security Fixes Release", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9787", "datePublished": "2017-07-13T15:00:00Z", "dateReserved": "2017-06-21T00:00:00", "dateUpdated": "2024-09-17T02:47:37.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1181 (GCVE-0-2016-1181)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-05 22:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:48:13.522Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2016-000096", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096" }, { "name": "91068", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91068" }, { "name": "1036056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036056" }, { "name": "JVN#03188560", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN03188560/index.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1181" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:53", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2016-000096", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096" }, { "name": "91068", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91068" }, { "name": "1036056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036056" }, { "name": "JVN#03188560", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN03188560/index.html" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1181" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-1181", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2016-000096", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000096" }, { "name": "91068", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91068" }, { "name": "1036056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036056" }, { "name": "JVN#03188560", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN03188560/index.html" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "name": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8", "refsource": "CONFIRM", "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343538" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2016-1181", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2016-1181" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-1181", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2015-12-26T00:00:00", "dateUpdated": "2024-08-05T22:48:13.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4003 (GCVE-0-2016-4003)
Vulnerability from cvelistv5
Published
2016-04-12 16:00
Modified
2024-08-06 00:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:17:29.844Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-028.html" }, { "name": "86311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/86311" }, { "name": "1035268", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035268" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-4507" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-028.html" }, { "name": "86311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/86311" }, { "name": "1035268", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035268" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-4507" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-4003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://struts.apache.org/docs/s2-028.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-028.html" }, { "name": "86311", "refsource": "BID", "url": "http://www.securityfocus.com/bid/86311" }, { "name": "1035268", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035268" }, { "name": "https://issues.apache.org/jira/browse/WW-4507", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/WW-4507" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-4003", "datePublished": "2016-04-12T16:00:00", "dateReserved": "2016-04-12T00:00:00", "dateUpdated": "2024-08-06T00:17:29.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2025 (GCVE-0-2008-2025)
Vulnerability from cvelistv5
Published
2009-04-09 15:00
Modified
2024-08-07 08:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters."
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:41:00.257Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34567" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml" }, { "name": "34642", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34642" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/security/cve/CVE-2008-2025.html" }, { "name": "53380", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/53380" }, { "name": "SUSE-SR:2009:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.net/bugs/cve/2008-2025" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=385273" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to \"insufficient quoting of parameters.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-16T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34567" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml" }, { "name": "34642", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34642" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/security/cve/CVE-2008-2025.html" }, { "name": "53380", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/53380" }, { "name": "SUSE-SR:2009:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.net/bugs/cve/2008-2025" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=385273" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to \"insufficient quoting of parameters.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34567" }, { "name": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml", "refsource": "CONFIRM", "url": "http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml" }, { "name": "34642", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34642" }, { "name": "http://support.novell.com/security/cve/CVE-2008-2025.html", "refsource": "CONFIRM", "url": "http://support.novell.com/security/cve/CVE-2008-2025.html" }, { "name": "53380", "refsource": "OSVDB", "url": "http://osvdb.org/53380" }, { "name": "SUSE-SR:2009:008", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" }, { "name": "https://launchpad.net/bugs/cve/2008-2025", "refsource": "MISC", "url": "https://launchpad.net/bugs/cve/2008-2025" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=385273", "refsource": "MISC", "url": "https://bugzilla.novell.com/show_bug.cgi?id=385273" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2025", "datePublished": "2009-04-09T15:00:00", "dateReserved": "2008-04-30T00:00:00", "dateUpdated": "2024-08-07T08:41:00.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1327 (GCVE-0-2018-1327)
Vulnerability from cvelistv5
Published
2018-03-27 21:00
Modified
2024-09-16 23:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- DoS attack
Summary
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: Apache Struts 2.1.1 to 2.5.14.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:38.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180330-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "1040575", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040575" }, { "name": "103516", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103516" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-056" }, { "name": "[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Apache Struts 2.1.1 to 2.5.14.1" } ] } ], "datePublic": "2018-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS attack", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-08T04:06:22", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180330-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "1040575", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040575" }, { "name": "103516", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103516" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-056" }, { "name": "[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2018-03-27T00:00:00", "ID": "CVE-2018-1327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "Apache Struts 2.1.1 to 2.5.14.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS attack" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20180330-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180330-0001/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "1040575", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040575" }, { "name": "103516", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103516" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-056", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/WW/S2-056" }, { "name": "[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2018-1327", "datePublished": "2018-03-27T21:00:00Z", "dateReserved": "2017-12-07T00:00:00", "dateUpdated": "2024-09-16T23:11:07.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1592 (GCVE-0-2012-1592)
Vulnerability from cvelistv5
Published
2019-12-05 20:57
Modified
2024-08-06 19:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- xsltResult local code execution flaw
Summary
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
libstruts1.2-java | libstruts1.2-java |
Version: 1.2- |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.750Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-1592" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1592" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2012-1592" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/28/12" }, { "name": "[struts-issues] 20200122 [jira] [Created] (WW-5055) Fix for security vulnerability CVE-2012-1592 identified in the National Vulnerability Database", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r348ed455a140273c40b974f0615dee692f7c9b26c6de2118b4280ef2%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20200123 [jira] [Closed] (WW-5055) Fix for security vulnerability CVE-2012-1592 identified in the National Vulnerability Database", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r93c4e3f6cb138cd117c739714f07e47af547183ba099ba46be2b2a5b%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20200903 [jira] [Commented] (WW-5055) Fix for security vulnerability CVE-2012-1592 identified in the National Vulnerability Database", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r593ebb2f4c95b064e6901fd273eff256c493db952bdb484395948ffc%40%3Cissues.struts.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "libstruts1.2-java", "vendor": "libstruts1.2-java", "versions": [ { "status": "affected", "version": "1.2-" } ] } ], "datePublic": "2013-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "description": "xsltResult local code execution flaw", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-04T01:06:13", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-1592" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1592" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2012-1592" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/28/12" }, { "name": "[struts-issues] 20200122 [jira] [Created] (WW-5055) Fix for security vulnerability CVE-2012-1592 identified in the National Vulnerability Database", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r348ed455a140273c40b974f0615dee692f7c9b26c6de2118b4280ef2%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20200123 [jira] [Closed] (WW-5055) Fix for security vulnerability CVE-2012-1592 identified in the National Vulnerability Database", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r93c4e3f6cb138cd117c739714f07e47af547183ba099ba46be2b2a5b%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20200903 [jira] [Commented] (WW-5055) Fix for security vulnerability CVE-2012-1592 identified in the National Vulnerability Database", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r593ebb2f4c95b064e6901fd273eff256c493db952bdb484395948ffc%40%3Cissues.struts.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1592", "datePublished": "2019-12-05T20:57:22", "dateReserved": "2012-03-12T00:00:00", "dateUpdated": "2024-08-06T19:01:02.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4310 (GCVE-0-2013-4310)
Vulnerability from cvelistv5
Published
2013-09-30 21:00
Modified
2024-08-06 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20131017 [ANN] Struts 2.3.15.3 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0083.html" }, { "name": "1029077", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029077" }, { "name": "54919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54919" }, { "name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-018.html" }, { "name": "56483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56483" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "56492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56492" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-04-26T23:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20131017 [ANN] Struts 2.3.15.3 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0083.html" }, { "name": "1029077", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029077" }, { "name": "54919", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54919" }, { "name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-018.html" }, { "name": "56483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56483" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "56492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56492" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20131017 [ANN] Struts 2.3.15.3 GA release available - security fix", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-10/0083.html" }, { "name": "1029077", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029077" }, { "name": "54919", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54919" }, { "name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "name": "http://struts.apache.org/release/2.3.x/docs/s2-018.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/release/2.3.x/docs/s2-018.html" }, { "name": "56483", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56483" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "56492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56492" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4310", "datePublished": "2013-09-30T21:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4316 (GCVE-0-2013-4316)
Vulnerability from cvelistv5
Published
2013-09-30 21:00
Modified
2024-08-06 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "1029078", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029078" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-16T01:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "1029078", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029078" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html" }, { "name": "http://struts.apache.org/release/2.3.x/docs/s2-019.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "1029078", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029078" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4316", "datePublished": "2013-09-30T21:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6505 (GCVE-0-2008-6505)
Vulnerability from cvelistv5
Published
2009-03-23 14:00
Modified
2024-08-07 11:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:34:46.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/struts/browse/WW-2779" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-004.html" }, { "name": "ADV-2008-3003", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "name": "32497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32497" }, { "name": "32104", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32104" }, { "name": "49733", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49733" }, { "name": "49734", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49734" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-08-19T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/struts/browse/WW-2779" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-004.html" }, { "name": "ADV-2008-3003", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "name": "32497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32497" }, { "name": "32104", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32104" }, { "name": "49733", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49733" }, { "name": "49734", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49734" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://issues.apache.org/struts/browse/WW-2779", "refsource": "CONFIRM", "url": "http://issues.apache.org/struts/browse/WW-2779" }, { "name": "http://struts.apache.org/2.x/docs/s2-004.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/s2-004.html" }, { "name": "ADV-2008-3003", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "name": "32497", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32497" }, { "name": "32104", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32104" }, { "name": "49733", "refsource": "OSVDB", "url": "http://osvdb.org/49733" }, { "name": "49734", "refsource": "OSVDB", "url": "http://osvdb.org/49734" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6505", "datePublished": "2009-03-23T14:00:00", "dateReserved": "2009-03-23T00:00:00", "dateUpdated": "2024-08-07T11:34:46.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2135 (GCVE-0-2013-2135)
Vulnerability from cvelistv5
Published
2013-07-16 18:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.875Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both \"${}\" and \"%{}\" sequences, which causes the OGNL code to be evaluated twice." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-04-26T23:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2135", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both \"${}\" and \"%{}\" sequences, which causes the OGNL code to be evaluated twice." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://struts.apache.org/development/2.x/docs/s2-015.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-015", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2135", "datePublished": "2013-07-16T18:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7672 (GCVE-0-2017-7672)
Vulnerability from cvelistv5
Published
2017-07-13 15:00
Modified
2024-09-17 01:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- DoS Attack
Summary
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.5 to 2.5.10.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:27.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "99563", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99563" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-047.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "name": "1039114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039114" }, { "name": "[announcements] 20170713 Apache Struts 2.5.12 GA with Security Fixes Release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.5 to 2.5.10.1" } ] } ], "datePublic": "2017-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS Attack", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-07T09:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "99563", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99563" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-047.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "name": "1039114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039114" }, { "name": "[announcements] 20170713 Apache Struts 2.5.12 GA with Security Fixes Release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d%40%3Cannouncements.struts.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-07-13T00:00:00", "ID": "CVE-2017-7672", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.5 to 2.5.10.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS Attack" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "99563", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99563" }, { "name": "http://struts.apache.org/docs/s2-047.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-047.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180706-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" }, { "name": "1039114", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039114" }, { "name": "[announcements] 20170713 Apache Struts 2.5.12 GA with Security Fixes Release", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-7672", "datePublished": "2017-07-13T15:00:00Z", "dateReserved": "2017-04-11T00:00:00", "dateUpdated": "2024-09-17T01:41:33.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6726 (GCVE-0-2007-6726)
Vulnerability from cvelistv5
Published
2009-04-09 15:00
Modified
2024-08-07 16:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:18:20.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dojotoolkit.org/releaseNotes/0.4.3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately" }, { "name": "dojo-xipclient-xipserver-xss(49884)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49884" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/struts/browse/WW-2134" }, { "name": "34660", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34660" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dojotoolkit.org/releaseNotes/0.4.3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately" }, { "name": "dojo-xipclient-xipserver-xss(49884)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49884" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/struts/browse/WW-2134" }, { "name": "34660", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34660" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.dojotoolkit.org/releaseNotes/0.4.3", "refsource": "CONFIRM", "url": "http://www.dojotoolkit.org/releaseNotes/0.4.3" }, { "name": "http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately", "refsource": "CONFIRM", "url": "http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately" }, { "name": "dojo-xipclient-xipserver-xss(49884)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49884" }, { "name": "https://issues.apache.org/struts/browse/WW-2134", "refsource": "CONFIRM", "url": "https://issues.apache.org/struts/browse/WW-2134" }, { "name": "34660", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34660" }, { "name": "http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds", "refsource": "CONFIRM", "url": "http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6726", "datePublished": "2009-04-09T15:00:00", "dateReserved": "2009-04-09T00:00:00", "dateUpdated": "2024-08-07T16:18:20.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4433 (GCVE-0-2016-4433)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks via a crafted request.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:24.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-039.html" }, { "name": "91282", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91282" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348251" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "JVN#45093481", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "JVNDB-2016-000112", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000112" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks via a crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-039.html" }, { "name": "91282", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91282" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348251" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "JVN#45093481", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "JVNDB-2016-000112", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000112" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks via a crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://struts.apache.org/docs/s2-039.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-039.html" }, { "name": "91282", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91282" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348251", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348251" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "JVN#45093481", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "JVNDB-2016-000112", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000112" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4433", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:24.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1772 (GCVE-0-2011-1772)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-08-06 22:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "name": "47784", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47784" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-006.html" }, { "name": "JVNDB-2011-000106", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106" }, { "name": "JVN#25435092", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN25435092/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "name": "47784", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47784" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-006.html" }, { "name": "JVNDB-2011-000106", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106" }, { "name": "JVN#25435092", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN25435092/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1772", "datePublished": "2011-05-13T17:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-6348 (GCVE-0-2013-6348)
Vulnerability from cvelistv5
Published
2013-11-02 21:00
Modified
2024-08-06 17:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.3.15.3 allow remote attackers to inject arbitrary web script or HTML via the namespace parameter to (1) actionNames.action and (2) showConfig.action in config-browser/.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:00.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99047", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/99047" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html" }, { "name": "1029266", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029266" }, { "name": "99048", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/99048" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://en.wooyun.org/bugs/wooyun-2013-034?2592" }, { "name": "20131028 [Wooyun]Apache Struts2 showcase multiple XSS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/244" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.3.15.3 allow remote attackers to inject arbitrary web script or HTML via the namespace parameter to (1) actionNames.action and (2) showConfig.action in config-browser/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-25T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "99047", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/99047" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html" }, { "name": "1029266", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029266" }, { "name": "99048", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/99048" }, { "tags": [ "x_refsource_MISC" ], "url": "http://en.wooyun.org/bugs/wooyun-2013-034?2592" }, { "name": "20131028 [Wooyun]Apache Struts2 showcase multiple XSS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/244" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-6348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.3.15.3 allow remote attackers to inject arbitrary web script or HTML via the namespace parameter to (1) actionNames.action and (2) showConfig.action in config-browser/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "99047", "refsource": "OSVDB", "url": "http://osvdb.org/99047" }, { "name": "http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/123805/Struts-2.3.15.3-Cross-Site-Scripting.html" }, { "name": "1029266", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029266" }, { "name": "99048", "refsource": "OSVDB", "url": "http://osvdb.org/99048" }, { "name": "http://en.wooyun.org/bugs/wooyun-2013-034?2592", "refsource": "MISC", "url": "http://en.wooyun.org/bugs/wooyun-2013-034?2592" }, { "name": "20131028 [Wooyun]Apache Struts2 showcase multiple XSS", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2013/Oct/244" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-6348", "datePublished": "2013-11-02T21:00:00", "dateReserved": "2013-11-02T00:00:00", "dateUpdated": "2024-08-06T17:39:00.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9804 (GCVE-0-2017-9804)
Vulnerability from cvelistv5
Published
2017-09-20 17:00
Modified
2024-09-17 03:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- A regular expression Denial of Service when using URLValidator (similar to S2-044 & S2-047)
Summary
In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3.7 - 2.3.33 Version: 2.5 - 2.5.12 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "name": "100612", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100612" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "name": "1039261", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039261" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-050.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3.7 - 2.3.33" }, { "status": "affected", "version": "2.5 - 2.5.12" } ] } ], "datePublic": "2017-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672." } ], "problemTypes": [ { "descriptions": [ { "description": "A regular expression Denial of Service when using URLValidator (similar to S2-044 \u0026 S2-047)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "name": "100612", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100612" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "name": "1039261", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039261" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-050.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-09-05T00:00:00", "ID": "CVE-2017-9804", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.3.7 - 2.3.33" }, { "version_value": "2.5 - 2.5.12" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A regular expression Denial of Service when using URLValidator (similar to S2-044 \u0026 S2-047)" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "name": "100612", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100612" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "name": "1039261", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039261" }, { "name": "https://struts.apache.org/docs/s2-050.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-050.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9804", "datePublished": "2017-09-20T17:00:00Z", "dateReserved": "2017-06-21T00:00:00", "dateUpdated": "2024-09-17T03:37:30.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2251 (GCVE-0-2013-2251)
Vulnerability from cvelistv5
Published
2013-07-18 01:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "apache-archiva-ognl-command-exec(90392)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "name": "20131013 Apache Software Foundation A Subsite Remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archiva.apache.org/security.html" }, { "name": "98445", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/98445" }, { "name": "1032916", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032916" }, { "name": "61189", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61189" }, { "name": "1029184", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029184" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2013-2251", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:24:31.949070Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2251" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:54.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-25T00:00:00+00:00", "value": "CVE-2013-2251 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-16T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:06:20.000Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "apache-archiva-ognl-command-exec(90392)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90392" }, { "name": "20131013 Apache Software Foundation A Subsite Remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2013/Oct/96" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cxsecurity.com/issue/WLB-2014010087" }, { "name": "20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archiva.apache.org/security.html" }, { "name": "98445", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/98445" }, { "name": "1032916", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032916" }, { "name": "61189", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61189" }, { "name": "1029184", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029184" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/89" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2251", "datePublished": "2013-07-18T01:00:00.000Z", "dateReserved": "2013-02-19T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:54.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4461 (GCVE-0-2016-4461)
Vulnerability from cvelistv5
Published
2017-10-16 16:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91277", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91277" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-036.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "91277", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91277" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-036.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91277", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91277" }, { "name": "https://struts.apache.org/docs/s2-036.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-036.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4461", "datePublished": "2017-10-16T16:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:25.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1007 (GCVE-0-2012-1007)
Vulnerability from cvelistv5
Published
2012-02-07 02:00
Modified
2024-08-06 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:26.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secpod.org/blog/?p=450" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "apache-struts-name-xss(73052)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "51900", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51900" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secpod.org/blog/?p=450" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "apache-struts-name-xss(73052)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "51900", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51900" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secpod.org/blog/?p=450", "refsource": "MISC", "url": "http://secpod.org/blog/?p=450" }, { "name": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt", "refsource": "MISC", "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "apache-struts-name-xss(73052)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73052" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "51900", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51900" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1007", "datePublished": "2012-02-07T02:00:00", "dateReserved": "2012-02-06T00:00:00", "dateUpdated": "2024-08-06T18:45:26.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41835 (GCVE-0-2023-41835)
Vulnerability from cvelistv5
Published
2023-12-05 08:37
Modified
2025-05-28 15:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-459 - Incomplete Cleanup
Summary
When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied.
Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.0.0 ≤ 2.5.31 Version: 6.1.2.1 ≤ 6.3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:48.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "mailing-list", "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft" }, { "tags": [ "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2023/12/09/1" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-41835", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T15:55:29.926474Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T15:56:00.942Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "packageName": "org.apache.struts", "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.5.31", "status": "affected", "version": "2.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.3.0", "status": "affected", "version": "6.1.2.1", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWhen a Multipart request is performed but some of the fields exceed the \u003c/span\u003e\u003ccode\u003emaxStringLength\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp; limit, the upload files will remain in \u003c/span\u003e\u003ccode\u003estruts.multipart.saveDir\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp; even if the request has been denied.\u003c/span\u003e\u003cbr\u003eUsers are recommended to upgrade to versions \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eStruts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater\u003c/span\u003e, which fixe this issue." } ], "value": "When a Multipart request is performed but some of the fields exceed the maxStringLength\u00a0 limit, the upload files will remain in struts.multipart.saveDir\u00a0 even if the request has been denied.\nUsers are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue." } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-12T08:42:20.578Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "mailing-list", "vendor-advisory" ], "url": "https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft" }, { "url": "https://www.openwall.com/lists/oss-security/2023/12/09/1" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Struts: excessive disk usage", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-41835", "datePublished": "2023-12-05T08:37:31.602Z", "dateReserved": "2023-09-04T07:53:19.551Z", "dateUpdated": "2025-05-28T15:56:00.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0394 (GCVE-0-2012-0394)
Vulnerability from cvelistv5
Published
2012-01-08 15:00
Modified
2024-08-06 18:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "name": "31434", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/31434" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "78276", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/78276" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not \"a security vulnerability itself." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-10T22:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "name": "31434", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/31434" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "78276", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/78276" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not \"a security vulnerability itself.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://struts.apache.org/2.x/docs/version-notes-2311.html", "refsource": "MISC", "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "name": "http://struts.apache.org/2.x/docs/s2-008.html", "refsource": "MISC", "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "name": "18329", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "name": "31434", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/31434" }, { "name": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt", "refsource": "MISC", "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "78276", "refsource": "OSVDB", "url": "http://www.osvdb.org/78276" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0394", "datePublished": "2012-01-08T15:00:00", "dateReserved": "2012-01-08T00:00:00", "dateUpdated": "2024-08-06T18:23:30.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-1831 (GCVE-0-2015-1831)
Vulnerability from cvelistv5
Published
2015-07-16 14:00
Modified
2024-08-06 04:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to "compromise internal state of an application" via unspecified vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-024.html" }, { "name": "75940", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75940" }, { "name": "1032985", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032985" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to \"compromise internal state of an application\" via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-21T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-024.html" }, { "name": "75940", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75940" }, { "name": "1032985", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032985" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1831", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to \"compromise internal state of an application\" via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://struts.apache.org/docs/s2-024.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-024.html" }, { "name": "75940", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75940" }, { "name": "1032985", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032985" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1831", "datePublished": "2015-07-16T14:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-12611 (GCVE-0-2017-12611)
Vulnerability from cvelistv5
Published
2017-09-20 17:00
Modified
2024-09-17 01:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- A possible Remote Code Execution attack when using an unintentional expression in Freemarker tag instead of string literals
Summary
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.0.0 - 2.3.33 Version: 2.5 - 2.5.10.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-053.html" }, { "name": "100829", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100829" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.0.0 - 2.3.33" }, { "status": "affected", "version": "2.5 - 2.5.10.1" } ] } ], "datePublic": "2017-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack." } ], "problemTypes": [ { "descriptions": [ { "description": "A possible Remote Code Execution attack when using an unintentional expression in Freemarker tag instead of string literals", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-053.html" }, { "name": "100829", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100829" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-09-07T00:00:00", "ID": "CVE-2017-12611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.0.0 - 2.3.33" }, { "version_value": "2.5 - 2.5.10.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A possible Remote Code Execution attack when using an unintentional expression in Freemarker tag instead of string literals" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt" }, { "name": "https://struts.apache.org/docs/s2-053.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-053.html" }, { "name": "100829", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100829" }, { "name": "https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001", "refsource": "CONFIRM", "url": "https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-12611", "datePublished": "2017-09-20T17:00:00Z", "dateReserved": "2017-08-07T00:00:00", "dateUpdated": "2024-09-17T01:30:41.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2248 (GCVE-0-2013-2248)
Vulnerability from cvelistv5
Published
2013-07-18 01:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-017.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "61196", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61196" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-017.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "61196", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61196" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2248", "datePublished": "2013-07-18T01:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0230 (GCVE-0-2019-0230)
Vulnerability from cvelistv5
Published
2020-09-14 16:41
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache Struts |
Version: Apache Struts 2.0.0 to 2.5.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:15.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-059" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache Struts 2.0.0 to 2.5.20" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-20T10:38:15", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-059" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0230", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "Apache Struts 2.0.0 to 2.5.20" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwiki.apache.org/confluence/display/ww/s2-059", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/ww/s2-059" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html" }, { "name": "https://launchpad.support.sap.com/#/notes/2982840", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "name": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0230", "datePublished": "2020-09-14T16:41:27", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:15.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4431 (GCVE-0-2016-4431)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91284", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91284" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-040.html" }, { "name": "JVN#45093481", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "JVNDB-2016-000113", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000113" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "91284", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91284" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-040.html" }, { "name": "JVN#45093481", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "JVNDB-2016-000113", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000113" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91284", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91284" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348252", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348252" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "https://struts.apache.org/docs/s2-040.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-040.html" }, { "name": "JVN#45093481", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "JVNDB-2016-000113", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000113" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4431", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:25.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0392 (GCVE-0-2012-0392)
Vulnerability from cvelistv5
Published
2012-01-08 15:00
Modified
2024-09-16 22:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.983Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "[dailydave] 20120106 Apache Struts", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.immunityinc.com/pipermail/dailydave/2012-January/000011.html" }, { "name": "47393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47393" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-08T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "[dailydave] 20120106 Apache Struts", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.immunityinc.com/pipermail/dailydave/2012-January/000011.html" }, { "name": "47393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47393" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18329", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "name": "http://struts.apache.org/2.x/docs/version-notes-2311.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "name": "http://struts.apache.org/2.x/docs/s2-008.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "name": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt", "refsource": "MISC", "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "[dailydave] 20120106 Apache Struts", "refsource": "MLIST", "url": "https://lists.immunityinc.com/pipermail/dailydave/2012-January/000011.html" }, { "name": "47393", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47393" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0392", "datePublished": "2012-01-08T15:00:00Z", "dateReserved": "2012-01-08T00:00:00Z", "dateUpdated": "2024-09-16T22:20:33.133Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4386 (GCVE-0-2012-4386)
Vulnerability from cvelistv5
Published
2012-09-05 23:00
Modified
2024-08-06 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3858" }, { "name": "apache-struts-csrf(78182)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78182" }, { "name": "[oss-security] 20120901 Re: CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "name": "50420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50420" }, { "name": "55346", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-010.html" }, { "name": "[oss-security] 20120901 CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3858" }, { "name": "apache-struts-csrf(78182)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78182" }, { "name": "[oss-security] 20120901 Re: CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "name": "50420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50420" }, { "name": "55346", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-010.html" }, { "name": "[oss-security] 20120901 CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4386", "datePublished": "2012-09-05T23:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0113 (GCVE-0-2014-0113)
Vulnerability from cvelistv5
Published
2014-04-29 10:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "name": "59178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59178" }, { "name": "20140426 [ANN] Struts 2.3.16.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "name": "59178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59178" }, { "name": "20140426 [ANN] Struts 2.3.16.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwiki.apache.org/confluence/display/WW/S2-021", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "name": "59178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59178" }, { "name": "20140426 [ANN] Struts 2.3.16.2 GA release available - security fix", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0113", "datePublished": "2014-04-29T10:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6682 (GCVE-0-2008-6682)
Vulnerability from cvelistv5
Published
2009-04-09 15:00
Modified
2024-08-07 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) " (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:41:59.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34686", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34686" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/struts/browse/WW-2427" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/struts/browse/WW-2414" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) \" (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-28T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34686", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34686" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/struts/browse/WW-2427" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/struts/browse/WW-2414" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6682", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) \" (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34686", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34686" }, { "name": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html", "refsource": "CONFIRM", "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html" }, { "name": "https://issues.apache.org/struts/browse/WW-2427", "refsource": "CONFIRM", "url": "https://issues.apache.org/struts/browse/WW-2427" }, { "name": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html", "refsource": "CONFIRM", "url": "http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html" }, { "name": "https://issues.apache.org/struts/browse/WW-2414", "refsource": "CONFIRM", "url": "https://issues.apache.org/struts/browse/WW-2414" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6682", "datePublished": "2009-04-09T15:00:00", "dateReserved": "2009-04-09T00:00:00", "dateUpdated": "2024-08-07T11:41:59.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0391 (GCVE-0-2012-0391)
Vulnerability from cvelistv5
Published
2012-01-08 15:00
Modified
2025-07-30 01:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:31.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "name": "47393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47393" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2012-0391", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-10T20:07:52.407977Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-01-21", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0391" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:47:01.000Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-01-21T00:00:00+00:00", "value": "CVE-2012-0391 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-08T15:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "name": "47393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47393" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0391", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18329", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "name": "http://struts.apache.org/2.x/docs/version-notes-2311.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "name": "http://struts.apache.org/2.x/docs/s2-008.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "name": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt", "refsource": "MISC", "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "https://issues.apache.org/jira/browse/WW-3668", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "name": "47393", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47393" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0391", "datePublished": "2012-01-08T15:00:00.000Z", "dateReserved": "2012-01-08T00:00:00.000Z", "dateUpdated": "2025-07-30T01:47:01.000Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-3087 (GCVE-0-2016-3087)
Vulnerability from cvelistv5
Published
2016-06-07 18:00
Modified
2024-08-05 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:15.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036017", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036017" }, { "name": "39919", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39919/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "90960", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90960" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1036017", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036017" }, { "name": "39919", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39919/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "90960", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90960" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036017", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036017" }, { "name": "39919", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39919/" }, { "name": "http://struts.apache.org/docs/s2-033.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-033.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "90960", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90960" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3087", "datePublished": "2016-06-07T18:00:00", "dateReserved": "2016-03-10T00:00:00", "dateUpdated": "2024-08-05T23:40:15.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1547 (GCVE-0-2006-1547)
Vulnerability from cvelistv5
Published
2006-03-30 22:00
Modified
2025-07-30 01:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:48.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015856", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015856" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "name": "ADV-2006-1205", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "name": "17342", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17342" }, { "name": "19493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19493" }, { "name": "struts-actionform-dos(25613)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25613" }, { "name": "SUSE-SR:2006:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "name": "20117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20117" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38534" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2006-1547", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:35:54.338056Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-01-21", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2006-1547" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-749", "description": "CWE-749 Exposed Dangerous Method or Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:47:08.709Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-01-21T00:00:00+00:00", "value": "CVE-2006-1547 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-30T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01.000Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1015856", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015856" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "name": "ADV-2006-1205", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "name": "17342", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17342" }, { "name": "19493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19493" }, { "name": "struts-actionform-dos(25613)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25613" }, { "name": "SUSE-SR:2006:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "name": "20117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20117" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38534" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-1547", "datePublished": "2006-03-30T22:00:00.000Z", "dateReserved": "2006-03-30T00:00:00.000Z", "dateUpdated": "2025-07-30T01:47:08.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-3082 (GCVE-0-2016-3082)
Vulnerability from cvelistv5
Published
2016-04-26 14:00
Modified
2024-08-05 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:15.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "88826", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/88826" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-031.html" }, { "name": "1035664", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035664" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "88826", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/88826" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-031.html" }, { "name": "1035664", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035664" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "88826", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88826" }, { "name": "http://struts.apache.org/docs/s2-031.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-031.html" }, { "name": "1035664", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035664" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3082", "datePublished": "2016-04-26T14:00:00", "dateReserved": "2016-03-10T00:00:00", "dateUpdated": "2024-08-05T23:40:15.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8738 (GCVE-0-2016-8738)
Vulnerability from cvelistv5
Published
2017-09-20 17:00
Modified
2024-09-16 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Possible DoS attack when using URLValidator
Summary
In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.5 - 2.5.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:34:59.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "name": "94657", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94657" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-044.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.5 - 2.5.5" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL." } ], "problemTypes": [ { "descriptions": [ { "description": "Possible DoS attack when using URLValidator", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "name": "94657", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94657" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-044.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2016-12-19T00:00:00", "ID": "CVE-2016-8738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.5 - 2.5.5" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Possible DoS attack when using URLValidator" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20180629-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "name": "94657", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94657" }, { "name": "https://struts.apache.org/docs/s2-044.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-044.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-8738", "datePublished": "2017-09-20T17:00:00Z", "dateReserved": "2016-10-18T00:00:00", "dateUpdated": "2024-09-16T20:32:00.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34396 (GCVE-0-2023-34396)
Vulnerability from cvelistv5
Published
2023-06-14 07:50
Modified
2025-02-13 16:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 0 ≤ 2.5.30 Version: 0 ≤ 6.1.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:10:06.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-064" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/14/3" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34396", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T14:04:35.407590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T14:05:03.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.5.30", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Matthew McClain" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.\u003cp\u003eThis issue affects Apache Struts: through 2.5.30, through 6.1.2.\u003c/p\u003e\u003cp\u003eUpgrade to Struts 2.5.31 or 6.1.2.1 or greater\u003cbr\u003e\u003c/p\u003e" } ], "value": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.\n\nUpgrade to Struts 2.5.31 or 6.1.2.1 or greater" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T18:06:17.021Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-064" }, { "url": "http://www.openwall.com/lists/oss-security/2023/06/14/3" }, { "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" } ], "source": { "advisory": "S2-064", "discovery": "EXTERNAL" }, "title": "Apache Struts: DoS via OOM owing to no sanity limit on normal form fields in multipart forms", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-34396", "datePublished": "2023-06-14T07:50:59.730Z", "dateReserved": "2023-06-04T07:33:59.947Z", "dateUpdated": "2025-02-13T16:55:30.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-2162 (GCVE-0-2016-2162)
Vulnerability from cvelistv5
Published
2016-04-12 16:00
Modified
2024-08-05 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035272", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035272" }, { "name": "85070", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85070" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-030.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1035272", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035272" }, { "name": "85070", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85070" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-030.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035272", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035272" }, { "name": "85070", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85070" }, { "name": "http://struts.apache.org/docs/s2-030.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-030.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2162", "datePublished": "2016-04-12T16:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5209 (GCVE-0-2015-5209)
Vulnerability from cvelistv5
Published
2017-08-29 15:00
Modified
2024-08-06 06:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.x before 2.3.24.1 allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1033908", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033908" }, { "name": "82550", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/82550" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-026.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.24.1 allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1033908", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033908" }, { "name": "82550", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/82550" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-026.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.x before 2.3.24.1 allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1033908", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033908" }, { "name": "82550", "refsource": "BID", "url": "http://www.securityfocus.com/bid/82550" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0002/" }, { "name": "https://struts.apache.org/docs/s2-026.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-026.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5209", "datePublished": "2017-08-29T15:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0114 (GCVE-0-2014-0114)
Vulnerability from cvelistv5
Published
2014-04-30 10:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:38.989Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" }, { "name": "57477", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57477" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/BEANUTILS-463" }, { "name": "58710", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58710" }, { "name": "MDVSA-2014:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689" }, { "name": "FEDORA-2014-9380", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20140911-0001/" }, { "name": "59464", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59464" }, { "name": "59118", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59118" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/solutions/869353" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0219.html" }, { "name": "60703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60703" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375" }, { "name": "[oss-security] 20140707 Re: CVE request for commons-beanutils: \u0027class\u0027 property is exposed, potentially leading to RCE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/07/08/1" }, { "name": "RHSA-2018:2669", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2669" }, { "name": "GLSA-201607-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-09" }, { "name": "HPSBST03160", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141451023707502\u0026w=2" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303" }, { "name": "59228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59228" }, { "name": "59246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59246" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665" }, { "name": "[oss-security] 20140616 CVE request for commons-beanutils: \u0027class\u0027 property is exposed, potentially leading to RCE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/06/15/10" }, { "name": "59245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59245" }, { "name": "HPSBMU03090", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140801096002766\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "60177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60177" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496" }, { "name": "DSA-2940", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2940" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266" }, { "name": "59014", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59014" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091" }, { "name": "67121", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67121" }, { "name": "59480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59480" }, { "name": "HPSBGN03041", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=140119284401582\u0026w=2" }, { "name": "59479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59479" }, { "name": "59704", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59704" }, { "name": "58947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58947" }, { "name": "59718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59718" }, { "name": "59430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59430" }, { "name": "58851", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58851" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3Cdevnull.infra.apache.org%3E" }, { "name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3Ccommits.pulsar.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "[commons-issues] 20190521 [jira] [Created] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190522 [jira] [Commented] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190522 [jira] [Work logged] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-dev] 20190522 [beanutils2] CVE-2014-0114 Pull Request", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3Cdev.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-dev] 20190525 Re: [beanutils2] CVE-2014-0114 Pull Request", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3Cdev.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-commits] 20190528 [commons-beanutils] branch master updated: BEANUTILS-520: Mitigate CVE-2014-0114 by enabling SuppressPropertiesBeanIntrospector.SUPPRESS_CLASS by default. (#7)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3Ccommits.commons.apache.org%3E" }, { "name": "[commons-issues] 20190528 [jira] [Closed] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-notifications] 20190528 Build failed in Jenkins: commons-beanutils #74", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3Cnotifications.commons.apache.org%3E" }, { "name": "[commons-commits] 20190528 [commons-beanutils] branch master updated: [BEANUTILS-520] BeanUtils2 mitigate CVE-2014-0114.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3Ccommits.commons.apache.org%3E" }, { "name": "[commons-issues] 20190528 [jira] [Work logged] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-notifications] 20190528 Build failed in Jenkins: commons-beanutils #75", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3Cnotifications.commons.apache.org%3E" }, { "name": "[commons-dev] 20190605 Re: [beanutils] Towards 1.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3Cdev.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190615 [jira] [Updated] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190615 [jira] [Reopened] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190615 [jira] [Resolved] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-dev] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3Cdev.commons.apache.org%3E" }, { "name": "[commons-user] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3Cuser.commons.apache.org%3E" }, { "name": "[announce] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3Cannounce.apache.org%3E" }, { "name": "[commons-issues] 20190818 [jira] [Commented] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3Cissues.commons.apache.org%3E" }, { "name": "[activemq-gitbox] 20190903 [GitHub] [activemq-artemis] jeloba opened a new pull request #2820: Updated Apache BeanUtils to address CVE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3Cgitbox.activemq.apache.org%3E" }, { "name": "[activemq-issues] 20190904 [jira] [Created] (ARTEMIS-2470) Update Apache BeanUtils to Address CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3Cissues.activemq.apache.org%3E" }, { "name": "[commons-commits] 20190906 [commons-configuration] branch master updated: [CONFIGURATION-755][CVE-2014-0114] Update Apache Commons BeanUtils from 1.9.3 to 1.9.4.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3Ccommits.commons.apache.org%3E" }, { "name": "[commons-issues] 20190906 [jira] [Updated] (CONFIGURATION-755) [CVE-2014-0114] Update Apache Commons BeanUtils from 1.9.3 to 1.9.4.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190906 [jira] [Closed] (CONFIGURATION-755) [CVE-2014-0114] Update Apache Commons BeanUtils from 1.9.3 to 1.9.4.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E" }, { "name": "[activemq-issues] 20190909 [jira] [Work logged] (ARTEMIS-2470) Update Apache BeanUtils to Address CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3Cissues.activemq.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3Cissues.commons.apache.org%3E" }, { "name": "RHSA-2019:2995", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2995" }, { "name": "[commons-issues] 20191014 [jira] [Updated] (BEANUTILS-520) Mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3Cissues.commons.apache.org%3E" }, { "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "name": "[activemq-issues] 20200109 [jira] [Resolved] (ARTEMIS-2470) Update Apache BeanUtils to Address CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3Cissues.activemq.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 Re: CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3Csolr-user.lucene.apache.org%3E" }, { "name": "[dolphinscheduler-commits] 20210121 [GitHub] [incubator-dolphinscheduler] c-f-cooper commented on issue #4506: There is a vulnerability in beanutils 1.7.0,upgrade recommended", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3Ccommits.dolphinscheduler.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-21T14:06:10", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2014-0114-Apache-Ignite-is-vulnerable-to-existing-CVE-2014-0114-td31205.html" }, { "name": "57477", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57477" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/BEANUTILS-463" }, { "name": "58710", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58710" }, { "name": "MDVSA-2014:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675689" }, { "name": "FEDORA-2014-9380", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136958.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20140911-0001/" }, { "name": "59464", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59464" }, { "name": "59118", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59118" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675387" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/solutions/869353" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091938" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.2/RELEASE-NOTES.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0219.html" }, { "name": "60703", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60703" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675972" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676375" }, { "name": "[oss-security] 20140707 Re: CVE request for commons-beanutils: \u0027class\u0027 property is exposed, potentially leading to RCE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/07/08/1" }, { "name": "RHSA-2018:2669", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2669" }, { "name": "GLSA-201607-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-09" }, { "name": "HPSBST03160", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141451023707502\u0026w=2" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675898" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676110" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27042296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676303" }, { "name": "59228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59228" }, { "name": "59246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59246" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1116665" }, { "name": "[oss-security] 20140616 CVE request for commons-beanutils: \u0027class\u0027 property is exposed, potentially leading to RCE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/06/15/10" }, { "name": "59245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59245" }, { "name": "HPSBMU03090", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140801096002766\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21674128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676931" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "name": "60177", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60177" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21675496" }, { "name": "DSA-2940", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2940" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675266" }, { "name": "59014", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59014" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677110" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676091" }, { "name": "67121", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67121" }, { "name": "59480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59480" }, { "name": "HPSBGN03041", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=140119284401582\u0026w=2" }, { "name": "59479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59479" }, { "name": "59704", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59704" }, { "name": "58947", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58947" }, { "name": "59718", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59718" }, { "name": "59430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59430" }, { "name": "58851", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58851" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "name": "[infra-devnull] 20190329 [GitHub] [pulsar] massakam opened pull request #3938: Upgrade third party libraries with security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3Cdevnull.infra.apache.org%3E" }, { "name": "[pulsar-commits] 20190329 [GitHub] [pulsar] massakam opened a new pull request #3938: Upgrade third party libraries with security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3Ccommits.pulsar.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "[commons-issues] 20190521 [jira] [Created] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/97fc033dad4233a5d82fcb75521eabdd23dd99ef32eb96f407f96a1a%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190522 [jira] [Commented] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8e2bdfabd5b14836aa3cf900aa0a62ff9f4e22a518bb4e553ebcf55f%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/65b39fa6d700e511927e5668a4038127432178a210aff81500eb36e5%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190522 [jira] [Work logged] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/080af531a9113e29d3f6a060e3f992dc9f40315ec7234e15c3b339e3%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/ffde3f266d3bde190b54c9202169e7918a92de7e7e0337d792dc7263%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-dev] 20190522 [beanutils2] CVE-2014-0114 Pull Request", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/40fc236a35801a535cd49cf1979dbeab034b833c63a284941bce5bf1%40%3Cdev.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/15fcdf27fa060de276edc0b4098526afc21c236852eb3de9be9594f3%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/4c3fd707a049bfe0577dba8fc9c4868ffcdabe68ad86586a0a49242e%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-dev] 20190525 Re: [beanutils2] CVE-2014-0114 Pull Request", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/0340493a1ddf3660dee09a5c503449cdac5bec48cdc478de65858859%40%3Cdev.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/2ba22f2e3de945039db735cf6cbf7f8be901ab2537337c7b1dd6a0f0%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-commits] 20190528 [commons-beanutils] branch master updated: BEANUTILS-520: Mitigate CVE-2014-0114 by enabling SuppressPropertiesBeanIntrospector.SUPPRESS_CLASS by default. (#7)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/31f9dc2c9cb68e390634a4202f84b8569f64b6569bfcce46348fd9fd%40%3Ccommits.commons.apache.org%3E" }, { "name": "[commons-issues] 20190528 [jira] [Closed] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/098e9aae118ac5c06998a9ba4544ab2475162981d290fdef88e6f883%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-notifications] 20190528 Build failed in Jenkins: commons-beanutils #74", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/fda473f46e51019a78ab217a7a3a3d48dafd90846e75bd5536ef72f3%40%3Cnotifications.commons.apache.org%3E" }, { "name": "[commons-commits] 20190528 [commons-beanutils] branch master updated: [BEANUTILS-520] BeanUtils2 mitigate CVE-2014-0114.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/c24c0b931632a397142882ba248b7bd440027960f22845c6f664c639%40%3Ccommits.commons.apache.org%3E" }, { "name": "[commons-issues] 20190528 [jira] [Work logged] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/42ad6326d62ea8453d0d0ce12eff39bbb7c5b4fca9639da007291346%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-notifications] 20190528 Build failed in Jenkins: commons-beanutils #75", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ebc4f019798f6ce2a39f3e0c26a9068563a9ba092cdf3ece398d4e2f%40%3Cnotifications.commons.apache.org%3E" }, { "name": "[commons-dev] 20190605 Re: [beanutils] Towards 1.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/df093c662b5e49fe9e38ef91f78ffab09d0839dea7df69a747dffa86%40%3Cdev.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/9b5505632f5683ee17bda4f7878525e672226c7807d57709283ffa64%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190615 [jira] [Updated] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/cee6b1c4533be1a753614f6a7d7c533c42091e7cafd7053b8f62792a%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190615 [jira] [Reopened] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/df1c385f2112edffeff57a6b21d12e8d24031a9f578cb8ba22a947a8%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190615 [jira] [Resolved] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2454e058fd05ba30ca29442fdeb7ea47505d47a888fbc9f3a53f31d0%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/869c08899f34c1a70c9fb42f92ac0d043c98781317e0c19d7ba3f5e3%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/084ae814e69178d2ce174cfdf149bc6e46d7524f3308c08d3adb43cb%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/f3682772e62926b5c009eed63c62767021be6da0bb7427610751809f%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/aa4ca069c7aea5b1d7329bc21576c44a39bcc4eb7bb2760c4b16f2f6%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-dev] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/88c497eead24ed517a2bb3159d3dc48725c215e97fe7a98b2cf3ea25%40%3Cdev.commons.apache.org%3E" }, { "name": "[commons-user] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/0a35108a56e2d575e3b3985588794e39fbf264097aba66f4c5569e4f%40%3Cuser.commons.apache.org%3E" }, { "name": "[announce] 20190814 [SECURITY] CVE-2019-10086. Apache Commons Beanutils does not suppresses the class property in PropertyUtilsBean by default.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/918ec15a80fc766ff46c5d769cb8efc88fed6674faadd61a7105166b%40%3Cannounce.apache.org%3E" }, { "name": "[commons-issues] 20190818 [jira] [Commented] (BEANUTILS-520) BeanUtils2 mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/c7e31c3c90b292e0bafccc4e1b19c9afc1503a65d82cb7833dfd7478%40%3Cissues.commons.apache.org%3E" }, { "name": "[activemq-gitbox] 20190903 [GitHub] [activemq-artemis] jeloba opened a new pull request #2820: Updated Apache BeanUtils to address CVE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/d27c51b3c933f885460aa6d3004eb228916615caaaddbb8e8bfeeb40%40%3Cgitbox.activemq.apache.org%3E" }, { "name": "[activemq-issues] 20190904 [jira] [Created] (ARTEMIS-2470) Update Apache BeanUtils to Address CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/3f500972dceb48e3cb351f58565aecf6728b1ea7a69593af86c30b30%40%3Cissues.activemq.apache.org%3E" }, { "name": "[commons-commits] 20190906 [commons-configuration] branch master updated: [CONFIGURATION-755][CVE-2014-0114] Update Apache Commons BeanUtils from 1.9.3 to 1.9.4.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/1565e8b786dff4cb3b48ecc8381222c462c92076c9e41408158797b5%40%3Ccommits.commons.apache.org%3E" }, { "name": "[commons-issues] 20190906 [jira] [Updated] (CONFIGURATION-755) [CVE-2014-0114] Update Apache Commons BeanUtils from 1.9.3 to 1.9.4.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0%40%3Cissues.commons.apache.org%3E" }, { "name": "[commons-issues] 20190906 [jira] [Closed] (CONFIGURATION-755) [CVE-2014-0114] Update Apache Commons BeanUtils from 1.9.3 to 1.9.4.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5%40%3Cissues.commons.apache.org%3E" }, { "name": "[activemq-issues] 20190909 [jira] [Work logged] (ARTEMIS-2470) Update Apache BeanUtils to Address CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/0efed939139f5b9dcd62b8acf7cb8a9789227d14abdc0c6f141c4a4c%40%3Cissues.activemq.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/09981ae3df188a2ad1ce20f62ef76a5b2d27cf6b9ebab366cf1d6cc6%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/6b30629b32d020c40d537f00b004d281c37528d471de15ca8aec2cd4%40%3Cissues.commons.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/6afe2f935493e69a332b9c5a4f23cafe95c15ede1591a492cf612293%40%3Cissues.commons.apache.org%3E" }, { "name": "RHSA-2019:2995", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2995" }, { "name": "[commons-issues] 20191014 [jira] [Updated] (BEANUTILS-520) Mitigate CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/66176fa3caeca77058d9f5b0316419a43b4c3fa2b572e05b87132226%40%3Cissues.commons.apache.org%3E" }, { "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "name": "[activemq-issues] 20200109 [jira] [Resolved] (ARTEMIS-2470) Update Apache BeanUtils to Address CVE-2014-0114", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75d67108e557bb5d4c4318435067714a0180de525314b7e8dab9d04e%40%3Cissues.activemq.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 Re: CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55%40%3Csolr-user.lucene.apache.org%3E" }, { "name": "[dolphinscheduler-commits] 20210121 [GitHub] [incubator-dolphinscheduler] c-f-cooper commented on issue #4506: There is a vulnerability in beanutils 1.7.0,upgrade recommended", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r458d61eaeadecaad04382ebe583230bc027f48d9e85e4731bc573477%40%3Ccommits.dolphinscheduler.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0114", "datePublished": "2014-04-30T10:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:38.989Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4465 (GCVE-0-2016-4465)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348253" }, { "name": "91278", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91278" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-041.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "JVN#12352818", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN12352818/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "JVNDB-2016-000114", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000114" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348253" }, { "name": "91278", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91278" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-041.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "JVN#12352818", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN12352818/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "JVNDB-2016-000114", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000114" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348253", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348253" }, { "name": "91278", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91278" }, { "name": "https://struts.apache.org/docs/s2-041.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-041.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "JVN#12352818", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN12352818/index.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "JVNDB-2016-000114", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000114" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4465", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:25.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2088 (GCVE-0-2011-2088)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-08-06 22:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:46:00.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "name": "20110518 Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "name": "20110518 Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/jira/browse/WW-3579", "refsource": "MISC", "url": "https://issues.apache.org/jira/browse/WW-3579" }, { "name": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html", "refsource": "MISC", "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html" }, { "name": "http://www.ventuneac.net/security-advisories/MVSA-11-006", "refsource": "MISC", "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006" }, { "name": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html", "refsource": "MISC", "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html" }, { "name": "20110518 Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2088", "datePublished": "2011-05-13T17:00:00", "dateReserved": "2011-05-13T00:00:00", "dateUpdated": "2024-08-06T22:46:00.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-1182 (GCVE-0-2016-1182)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-05 22:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:48:13.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2016-000097", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097" }, { "name": "JVN#65044642", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN65044642/index.html" }, { "name": "1036056", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036056" }, { "name": "91067", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91067" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-15T02:22:53", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2016-000097", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097" }, { "name": "JVN#65044642", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN65044642/index.html" }, { "name": "1036056", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036056" }, { "name": "91067", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91067" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-1182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-1182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2016-000097", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000097" }, { "name": "JVN#65044642", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN65044642/index.html" }, { "name": "1036056", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036056" }, { "name": "91067", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91067" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "name": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8", "refsource": "CONFIRM", "url": "https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343540" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2016-1182", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2016-1182" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-1182", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2015-12-26T00:00:00", "dateUpdated": "2024-08-05T22:48:13.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4436 (GCVE-0-2016-4436)
Vulnerability from cvelistv5
Published
2016-10-03 15:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:24.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "91280", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91280" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "91280", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91280" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-035.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "91280", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91280" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://struts.apache.org/docs/s2-035.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-035.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4436", "datePublished": "2016-10-03T15:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:24.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-7809 (GCVE-0-2014-7809)
Vulnerability from cvelistv5
Published
2014-12-10 15:00
Modified
2024-08-06 13:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-023.html" }, { "name": "71548", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71548" }, { "name": "1031309", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031309" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "20141208 [ANN] Apache Struts 2.3.20 GA release available with security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534175/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable \u003cs:token/\u003e values, which allows remote attackers to bypass the CSRF protection mechanism." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-023.html" }, { "name": "71548", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71548" }, { "name": "1031309", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031309" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "20141208 [ANN] Apache Struts 2.3.20 GA release available with security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534175/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-7809", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable \u003cs:token/\u003e values, which allows remote attackers to bypass the CSRF protection mechanism." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" }, { "name": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html" }, { "name": "http://struts.apache.org/docs/s2-023.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-023.html" }, { "name": "71548", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71548" }, { "name": "1031309", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031309" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "20141208 [ANN] Apache Struts 2.3.20 GA release available with security fix", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534175/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-7809", "datePublished": "2014-12-10T15:00:00", "dateReserved": "2014-10-03T00:00:00", "dateUpdated": "2024-08-06T13:03:27.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-3093 (GCVE-0-2016-3093)
Vulnerability from cvelistv5
Published
2016-06-07 18:00
Modified
2024-08-05 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:15.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-034.html" }, { "name": "90961", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90961" }, { "name": "1036018", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036018" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "[struts-dev] 20190908 Build failed in Jenkins: Struts-master-JDK8-dependency-check #204", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-08T10:06:08", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-034.html" }, { "name": "90961", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90961" }, { "name": "1036018", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036018" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "[struts-dev] 20190908 Build failed in Jenkins: Struts-master-JDK8-dependency-check #204", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef%40%3Cdev.struts.apache.org%3E" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3093", "datePublished": "2016-06-07T18:00:00", "dateReserved": "2016-03-10T00:00:00", "dateUpdated": "2024-08-05T23:40:15.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-3090 (GCVE-0-2016-3090)
Vulnerability from cvelistv5
Published
2017-10-30 14:00
Modified
2024-08-05 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:15.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "85131", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-027.html" }, { "name": "1035267", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "https://www.securitytracker.com/id/1035267" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "85131", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-027.html" }, { "name": "1035267", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "https://www.securitytracker.com/id/1035267" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "85131", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85131" }, { "name": "https://struts.apache.org/docs/s2-027.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-027.html" }, { "name": "1035267", "refsource": "SECTRACK", "url": "https://www.securitytracker.com/id/1035267" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3090", "datePublished": "2017-10-30T14:00:00", "dateReserved": "2016-03-10T00:00:00", "dateUpdated": "2024-08-05T23:40:15.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-5057 (GCVE-0-2011-5057)
Vulnerability from cvelistv5
Published
2012-01-08 17:00
Modified
2024-08-07 00:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3631" }, { "name": "47109", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47109" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-2264" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an \"easy work-around in existing apps by configuring the interceptor.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3631" }, { "name": "47109", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47109" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-2264" }, { "tags": [ "x_refsource_MISC" ], "url": "http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an \"easy work-around in existing apps by configuring the interceptor.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/jira/browse/WW-3631", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/WW-3631" }, { "name": "47109", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47109" }, { "name": "https://issues.apache.org/jira/browse/WW-2264", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/WW-2264" }, { "name": "http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html", "refsource": "MISC", "url": "http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5057", "datePublished": "2012-01-08T17:00:00", "dateReserved": "2012-01-08T00:00:00", "dateUpdated": "2024-08-07T00:23:39.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1870 (GCVE-0-2010-1870)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16" }, { "name": "14360", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/14360" }, { "name": "41592", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41592" }, { "name": "66280", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/66280" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.2.1/docs/s2-005.html" }, { "name": "59110", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59110" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2" }, { "name": "20100713 CVE-2010-1870: Struts2 remote commands execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2010/Jul/183" }, { "name": "8345", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8345" }, { "name": "20201020 LISTSERV Maestro Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Oct/23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the \"#\" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:06:24", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16" }, { "name": "14360", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/14360" }, { "name": "41592", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41592" }, { "name": "66280", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/66280" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.2.1/docs/s2-005.html" }, { "name": "59110", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59110" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2" }, { "name": "20100713 CVE-2010-1870: Struts2 remote commands execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2010/Jul/183" }, { "name": "8345", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8345" }, { "name": "20201020 LISTSERV Maestro Remote Code Execution Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Oct/23" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the \"#\" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16" }, { "name": "14360", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/14360" }, { "name": "41592", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41592" }, { "name": "66280", "refsource": "OSVDB", "url": "http://www.osvdb.org/66280" }, { "name": "http://struts.apache.org/2.2.1/docs/s2-005.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.2.1/docs/s2-005.html" }, { "name": "59110", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59110" }, { "name": "http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html", "refsource": "MISC", "url": "http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html" }, { "name": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2", "refsource": "CONFIRM", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2" }, { "name": "20100713 CVE-2010-1870: Struts2 remote commands execution", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2010/Jul/183" }, { "name": "8345", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/8345" }, { "name": "20201020 LISTSERV Maestro Remote Code Execution Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Oct/23" }, { "name": "http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1870", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-05-10T00:00:00", "dateUpdated": "2024-08-07T01:35:53.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-2992 (GCVE-0-2015-2992)
Vulnerability from cvelistv5
Published
2020-02-27 17:45
Modified
2024-08-06 05:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-Site Scripting
Summary
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: before 2.3.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN88408929/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76624" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200330-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "before 2.3.20" } ] } ], "datePublic": "2015-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-30T09:06:09", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://jvn.jp/en/jp/JVN88408929/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/76624" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200330-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-2992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "before 2.3.20" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "http://jvn.jp/en/jp/JVN88408929/index.html", "refsource": "MISC", "url": "http://jvn.jp/en/jp/JVN88408929/index.html" }, { "name": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html", "refsource": "MISC", "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html" }, { "name": "http://www.securityfocus.com/bid/76624", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/76624" }, { "name": "https://security.netapp.com/advisory/ntap-20200330-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200330-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-2992", "datePublished": "2020-02-27T17:45:34", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0393 (GCVE-0-2012-0393)
Vulnerability from cvelistv5
Published
2012-01-08 15:00
Modified
2024-09-16 22:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "47393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47393" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-08T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "47393", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47393" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0393", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18329", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18329" }, { "name": "20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html" }, { "name": "http://struts.apache.org/2.x/docs/version-notes-2311.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/version-notes-2311.html" }, { "name": "http://struts.apache.org/2.x/docs/s2-008.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/s2-008.html" }, { "name": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt", "refsource": "MISC", "url": "https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt" }, { "name": "47393", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47393" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0393", "datePublished": "2012-01-08T15:00:00Z", "dateReserved": "2012-01-08T00:00:00Z", "dateUpdated": "2024-09-16T22:24:46.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-26259 (GCVE-0-2020-26259)
Vulnerability from cvelistv5
Published
2020-12-16 01:05
Modified
2024-08-04 15:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - OS Command Injection
Summary
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:04.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://x-stream.github.io/CVE-2020-26259.html" }, { "name": "[struts-commits] 20201221 [struts] branch master updated: Upgrades XStream to version 1.4.15 to address CVE-2020-26258, CVE-2020-26259", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E" }, { "name": "[debian-lts-announce] 20201231 [SECURITY] [DLA 2507-1] libxstream-java security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "name": "DSA-4828", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "name": "FEDORA-2021-fbad11014a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "name": "FEDORA-2021-d894ca87dc", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "name": "FEDORA-2021-5e376c0ed9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xstream", "vendor": "x-stream", "versions": [ { "status": "affected", "version": "\u003c 1.4.15" } ] } ], "descriptions": [ { "lang": "en", "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-30T01:08:04", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://x-stream.github.io/CVE-2020-26259.html" }, { "name": "[struts-commits] 20201221 [struts] branch master updated: Upgrades XStream to version 1.4.15 to address CVE-2020-26258, CVE-2020-26259", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E" }, { "name": "[debian-lts-announce] 20201231 [SECURITY] [DLA 2507-1] libxstream-java security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "name": "DSA-4828", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "name": "FEDORA-2021-fbad11014a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "name": "FEDORA-2021-d894ca87dc", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "name": "FEDORA-2021-5e376c0ed9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" } ], "source": { "advisory": "GHSA-jfvx-7wrx-43fh", "discovery": "UNKNOWN" }, "title": "XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26259", "STATE": "PUBLIC", "TITLE": "XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "xstream", "version": { "version_data": [ { "version_value": "\u003c 1.4.15" } ] } } ] }, "vendor_name": "x-stream" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh", "refsource": "CONFIRM", "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh" }, { "name": "https://x-stream.github.io/CVE-2020-26259.html", "refsource": "MISC", "url": "https://x-stream.github.io/CVE-2020-26259.html" }, { "name": "[struts-commits] 20201221 [struts] branch master updated: Upgrades XStream to version 1.4.15 to address CVE-2020-26258, CVE-2020-26259", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E" }, { "name": "[debian-lts-announce] 20201231 [SECURITY] [DLA 2507-1] libxstream-java security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "name": "DSA-4828", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4828" }, { "name": "https://security.netapp.com/advisory/ntap-20210409-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "name": "FEDORA-2021-fbad11014a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "name": "FEDORA-2021-d894ca87dc", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "name": "FEDORA-2021-5e376c0ed9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" } ] }, "source": { "advisory": "GHSA-jfvx-7wrx-43fh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26259", "datePublished": "2020-12-16T01:05:16", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:04.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4430 (GCVE-0-2016-4430)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 2.3.20 through 2.3.28.1 mishandles token validation, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:24.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-038.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348249" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "JVNDB-2016-000111", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000111" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "JVN#45093481", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "91281", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91281" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 mishandles token validation, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-30T13:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-038.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348249" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "JVNDB-2016-000111", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000111" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "JVN#45093481", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "91281", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91281" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 2.3.20 through 2.3.28.1 mishandles token validation, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://struts.apache.org/docs/s2-038.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-038.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348249", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348249" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21987854" }, { "name": "JVNDB-2016-000111", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000111" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282" }, { "name": "JVN#45093481", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN45093481/index.html" }, { "name": "91281", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91281" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4430", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:24.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2087 (GCVE-0-2011-2087)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-09-17 00:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:46:00.936Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3597" }, { "name": "ADV-2011-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3608" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-05-13T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3597" }, { "name": "ADV-2011-1198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3608" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/jira/browse/WW-3597", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/WW-3597" }, { "name": "ADV-2011-1198", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1198" }, { "name": "http://struts.apache.org/2.2.3/docs/version-notes-223.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html" }, { "name": "https://issues.apache.org/jira/browse/WW-3608", "refsource": "CONFIRM", "url": "https://issues.apache.org/jira/browse/WW-3608" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2087", "datePublished": "2011-05-13T17:00:00Z", "dateReserved": "2011-05-13T00:00:00Z", "dateUpdated": "2024-09-17T00:16:06.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-4438 (GCVE-0-2016-4438)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:24.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348238" }, { "name": "91275", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91275" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-037.html" }, { "name": "JVNDB-2016-000110", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "JVN#07710476", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN07710476/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348238" }, { "name": "91275", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91275" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-037.html" }, { "name": "JVNDB-2016-000110", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "JVN#07710476", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN07710476/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1348238", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348238" }, { "name": "91275", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91275" }, { "name": "https://struts.apache.org/docs/s2-037.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-037.html" }, { "name": "JVNDB-2016-000110", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "JVN#07710476", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN07710476/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4438", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:24.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-6504 (GCVE-0-2008-6504)
Vulnerability from cvelistv5
Published
2009-03-23 14:00
Modified
2024-08-07 11:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:34:47.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32495" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fisheye6.atlassian.com/cru/CR-9/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-003.html" }, { "name": "xwork-parameterinterceptor-security-bypass(46328)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328" }, { "name": "ADV-2008-3003", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "name": "ADV-2008-3004", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3004" }, { "name": "32101", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32101" }, { "name": "32497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32497" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://jira.opensymphony.com/browse/XW-641" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/struts/browse/WW-2692" }, { "name": "49732", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49732" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "32495", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32495" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fisheye6.atlassian.com/cru/CR-9/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-003.html" }, { "name": "xwork-parameterinterceptor-security-bypass(46328)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328" }, { "name": "ADV-2008-3003", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "name": "ADV-2008-3004", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3004" }, { "name": "32101", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32101" }, { "name": "32497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32497" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://jira.opensymphony.com/browse/XW-641" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/struts/browse/WW-2692" }, { "name": "49732", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49732" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32495", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32495" }, { "name": "http://fisheye6.atlassian.com/cru/CR-9/", "refsource": "CONFIRM", "url": "http://fisheye6.atlassian.com/cru/CR-9/" }, { "name": "http://struts.apache.org/2.x/docs/s2-003.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/2.x/docs/s2-003.html" }, { "name": "xwork-parameterinterceptor-security-bypass(46328)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328" }, { "name": "ADV-2008-3003", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3003" }, { "name": "ADV-2008-3004", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3004" }, { "name": "32101", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32101" }, { "name": "32497", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32497" }, { "name": "http://jira.opensymphony.com/browse/XW-641", "refsource": "CONFIRM", "url": "http://jira.opensymphony.com/browse/XW-641" }, { "name": "http://issues.apache.org/struts/browse/WW-2692", "refsource": "CONFIRM", "url": "http://issues.apache.org/struts/browse/WW-2692" }, { "name": "49732", "refsource": "OSVDB", "url": "http://osvdb.org/49732" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6504", "datePublished": "2009-03-23T14:00:00", "dateReserved": "2009-03-23T00:00:00", "dateUpdated": "2024-08-07T11:34:47.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3923 (GCVE-0-2011-3923)
Vulnerability from cvelistv5
Published
2019-11-01 13:57
Modified
2024-08-06 23:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:53:32.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "24874", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/24874" }, { "name": "51628", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51628" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Jul/38" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026575" }, { "name": "72585", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Struts", "vendor": "Apache", "versions": [ { "status": "affected", "version": "2.3.1.2" } ] } ], "datePublic": "2012-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-01T13:57:37", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "24874", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/24874" }, { "name": "51628", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51628" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2014/Jul/38" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securitytracker.com/id?1026575" }, { "name": "72585", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72585" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2011-3923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Struts", "version": { "version_data": [ { "version_value": "2.3.1.2" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "24874", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/24874" }, { "name": "51628", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51628" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2011-3923", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2011-3923" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923" }, { "name": "http://seclists.org/fulldisclosure/2014/Jul/38", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2014/Jul/38" }, { "name": "http://www.securitytracker.com/id?1026575", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1026575" }, { "name": "72585", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72585" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2011-3923", "datePublished": "2019-11-01T13:57:37", "dateReserved": "2011-10-01T00:00:00", "dateUpdated": "2024-08-06T23:53:32.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2134 (GCVE-0-2013-2134)
Vulnerability from cvelistv5
Published
2013-07-16 18:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "name": "60346", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "GLSA-201409-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201409-04.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "name": "60346", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "GLSA-201409-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201409-04.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://struts.apache.org/development/2.x/docs/s2-015.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/development/2.x/docs/s2-015.html" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-015", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/WW/S2-015" }, { "name": "60346", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60346" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "GLSA-201409-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201409-04.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2134", "datePublished": "2013-07-16T18:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2115 (GCVE-0-2013-2115)
Vulnerability from cvelistv5
Published
2013-07-10 19:00
Modified
2024-09-16 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "60167", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60167" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/development/2.x/docs/s2-014.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-10T19:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "60167", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60167" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/development/2.x/docs/s2-014.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "60167", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60167" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=967656", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "name": "http://struts.apache.org/development/2.x/docs/s2-014.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/development/2.x/docs/s2-014.html" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-014", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/WW/S2-014" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2115", "datePublished": "2013-07-10T19:00:00Z", "dateReserved": "2013-02-19T00:00:00Z", "dateUpdated": "2024-09-16T19:14:04.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0785 (GCVE-0-2016-0785)
Vulnerability from cvelistv5
Published
2016-04-12 16:00
Modified
2024-08-05 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:04.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035271", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035271" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-029.html" }, { "name": "85066", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/85066" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1035271", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035271" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-029.html" }, { "name": "85066", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/85066" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0785", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035271", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035271" }, { "name": "http://struts.apache.org/docs/s2-029.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-029.html" }, { "name": "85066", "refsource": "BID", "url": "http://www.securityfocus.com/bid/85066" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0785", "datePublished": "2016-04-12T16:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:04.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-50164 (GCVE-0-2023-50164)
Vulnerability from cvelistv5
Published
2023-12-07 08:49
Modified
2025-03-14 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-552 - Files or Directories Accessible to External Parties
Summary
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.0.0 ≤ 2.5.32 Version: 6.0.0 ≤ 6.3.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:09:49.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj" }, { "tags": [ "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2023/12/07/1" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20231214-0010/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-50164", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-16T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-14T03:55:16.463Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "packageName": "org.apache.struts", "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.5.32", "status": "affected", "version": "2.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.3.0.1", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Steven Seeley of Source Incite" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\u003c/span\u003e\u003cbr\u003eUsers are recommended to upgrade to versions \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eStruts 2.5.33 or Struts 6.3.0.2 or greater to\u003c/span\u003e\u0026nbsp;fix this issue.\u003cbr\u003e" } ], "value": "An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\nUsers are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to\u00a0fix this issue." } ], "metrics": [ { "other": { "content": { "text": "critical" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552 Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T10:06:29.117Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory", "mailing-list" ], "url": "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj" }, { "url": "https://www.openwall.com/lists/oss-security/2023/12/07/1" }, { "url": "http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html" }, { "url": "https://security.netapp.com/advisory/ntap-20231214-0010/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Struts: File upload component had a directory traversal vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-50164", "datePublished": "2023-12-07T08:49:19.853Z", "dateReserved": "2023-12-04T08:37:57.468Z", "dateUpdated": "2025-03-14T03:55:16.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-26258 (GCVE-0-2020-26258)
Vulnerability from cvelistv5
Published
2020-12-16 01:05
Modified
2025-01-15 20:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:04.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://x-stream.github.io/CVE-2020-26258.html" }, { "name": "[struts-commits] 20201221 [struts] branch master updated: Upgrades XStream to version 1.4.15 to address CVE-2020-26258, CVE-2020-26259", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E" }, { "name": "[debian-lts-announce] 20201231 [SECURITY] [DLA 2507-1] libxstream-java security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "name": "DSA-4828", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005/" }, { "name": "FEDORA-2021-fbad11014a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/" }, { "name": "FEDORA-2021-d894ca87dc", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/" }, { "name": "FEDORA-2021-5e376c0ed9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xstream", "vendor": "x-stream", "versions": [ { "status": "affected", "version": "\u003c 1.4.15" } ] } ], "descriptions": [ { "lang": "en", "value": "XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream\u0027s Security Framework with a whitelist! Anyone relying on XStream\u0027s default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-15T20:20:17.971Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28" }, { "name": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E", "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E" }, { "name": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html", "tags": [ "x_refsource_MISC" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP", "tags": [ "x_refsource_MISC" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7", "tags": [ "x_refsource_MISC" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB", "tags": [ "x_refsource_MISC" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB" }, { "name": "https://security.netapp.com/advisory/ntap-20210409-0005", "tags": [ "x_refsource_MISC" ], "url": "https://security.netapp.com/advisory/ntap-20210409-0005" }, { "name": "https://www.debian.org/security/2021/dsa-4828", "tags": [ "x_refsource_MISC" ], "url": "https://www.debian.org/security/2021/dsa-4828" }, { "name": "https://x-stream.github.io/CVE-2020-26258.html", "tags": [ "x_refsource_MISC" ], "url": "https://x-stream.github.io/CVE-2020-26258.html" } ], "source": { "advisory": "GHSA-4cch-wxpw-8p28", "discovery": "UNKNOWN" }, "title": "Server-Side Forgery Request can be activated unmarshalling with XStream" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26258", "datePublished": "2020-12-16T01:05:22", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2025-01-15T20:20:17.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1965 (GCVE-0-2013-1965)
Vulnerability from cvelistv5
Published
2013-07-10 19:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.522Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/development/2.x/docs/s2-012.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967655" }, { "name": "60082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60082" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:52", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/development/2.x/docs/s2-012.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967655" }, { "name": "60082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60082" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://struts.apache.org/development/2.x/docs/s2-012.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/development/2.x/docs/s2-012.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=967655", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967655" }, { "name": "60082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60082" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1965", "datePublished": "2013-07-10T19:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1966 (GCVE-0-2013-1966)
Vulnerability from cvelistv5
Published
2013-07-10 19:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.418Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "60166", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60166" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/development/2.x/docs/s2-013.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-013" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:52", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "60166", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60166" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/development/2.x/docs/s2-013.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-013" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "60166", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60166" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=967656", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=967656" }, { "name": "http://struts.apache.org/development/2.x/docs/s2-013.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/development/2.x/docs/s2-013.html" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-013", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/WW/S2-013" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1966", "datePublished": "2013-07-10T19:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3745 (GCVE-0-2005-3745)
Vulnerability from cvelistv5
Published
2005-11-22 11:00
Modified
2024-08-07 23:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:24:36.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2006:0161", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0161.html" }, { "name": "ADV-2005-2525", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2525" }, { "name": "21021", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/21021" }, { "name": "15512", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15512" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.hacktics.com/AdvStrutsNov05.html" }, { "name": "20051121 Security Advisory: Struts Error Message Cross Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/417296/30/0/threaded" }, { "name": "RHSA-2006:0157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0157.html" }, { "name": "1015257", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015257" }, { "name": "197", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/197" }, { "name": "17677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17677" }, { "name": "18341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18341" }, { "name": "[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-08T04:06:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2006:0161", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0161.html" }, { "name": "ADV-2005-2525", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2525" }, { "name": "21021", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/21021" }, { "name": "15512", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15512" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.hacktics.com/AdvStrutsNov05.html" }, { "name": "20051121 Security Advisory: Struts Error Message Cross Site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/417296/30/0/threaded" }, { "name": "RHSA-2006:0157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0157.html" }, { "name": "1015257", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015257" }, { "name": "197", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/197" }, { "name": "17677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17677" }, { "name": "18341", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18341" }, { "name": "[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2006:0161", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0161.html" }, { "name": "ADV-2005-2525", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2525" }, { "name": "21021", "refsource": "OSVDB", "url": "http://www.osvdb.org/21021" }, { "name": "15512", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15512" }, { "name": "http://www.hacktics.com/AdvStrutsNov05.html", "refsource": "MISC", "url": "http://www.hacktics.com/AdvStrutsNov05.html" }, { "name": "20051121 Security Advisory: Struts Error Message Cross Site Scripting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/417296/30/0/threaded" }, { "name": "RHSA-2006:0157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0157.html" }, { "name": "1015257", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015257" }, { "name": "197", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/197" }, { "name": "17677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17677" }, { "name": "18341", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18341" }, { "name": "[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E" }, { "name": "[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3745", "datePublished": "2005-11-22T11:00:00", "dateReserved": "2005-11-22T00:00:00", "dateUpdated": "2024-08-07T23:24:36.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11776 (GCVE-0-2018-11776)
Vulnerability from cvelistv5
Published
2018-08-22 13:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3 to 2.3.34 Version: 2.5 to 2.5.16 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:17:09.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041888", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041888" }, { "name": "45367", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45367/" }, { "name": "45262", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45262/" }, { "name": "105125", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105125" }, { "name": "1041547", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041547" }, { "name": "45260", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45260/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20181018-0002/" }, { "tags": [ "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-057" }, { "tags": [ "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html" }, { "tags": [ "x_transferred" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2018-11776" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180822-0001/" }, { "tags": [ "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt" }, { "tags": [ "x_transferred" ], "url": "https://github.com/hook-s3c/CVE-2018-11776-Python-PoC" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-11776", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T21:01:33.678556Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-11776" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:12.611Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2018-11776 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3 to 2.3.34" }, { "status": "affected", "version": "2.5 to 2.5.16" } ] } ], "datePublic": "2018-08-22T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn\u0027t have value and action set and in same time, its upper package have no or wildcard namespace." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-12T00:00:00.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "1041888", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1041888" }, { "name": "45367", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/45367/" }, { "name": "45262", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/45262/" }, { "name": "105125", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/105125" }, { "name": "1041547", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1041547" }, { "name": "45260", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/45260/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "url": "https://security.netapp.com/advisory/ntap-20181018-0002/" }, { "url": "https://cwiki.apache.org/confluence/display/WW/S2-057" }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012" }, { "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html" }, { "url": "https://lgtm.com/blog/apache_struts_CVE-2018-11776" }, { "url": "https://security.netapp.com/advisory/ntap-20180822-0001/" }, { "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt" }, { "url": "https://github.com/hook-s3c/CVE-2018-11776-Python-PoC" }, { "url": "http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html" } ] } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2018-11776", "datePublished": "2018-08-22T13:00:00.000Z", "dateReserved": "2018-06-05T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:12.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9791 (GCVE-0-2017-9791)
Vulnerability from cvelistv5
Published
2017-07-10 16:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.1.x series Version: 2.3.x series |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "99484", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99484" }, { "name": "42324", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42324/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/docs/s2-048.html" }, { "name": "1038838", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038838" }, { "name": "44643", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44643/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-9791", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T21:07:10.679448Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-02-10", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9791" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:26.637Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-02-10T00:00:00+00:00", "value": "CVE-2017-9791 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.1.x series" }, { "status": "affected", "version": "2.3.x series" } ] } ], "datePublic": "2017-07-07T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "99484", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99484" }, { "name": "42324", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42324/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/docs/s2-048.html" }, { "name": "1038838", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038838" }, { "name": "44643", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44643/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-07-07T00:00:00", "ID": "CVE-2017-9791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.1.x series" }, { "version_value": "2.3.x series" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "99484", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99484" }, { "name": "42324", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42324/" }, { "name": "http://struts.apache.org/docs/s2-048.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/docs/s2-048.html" }, { "name": "1038838", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038838" }, { "name": "44643", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44643/" }, { "name": "https://security.netapp.com/advisory/ntap-20180706-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180706-0002/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9791", "datePublished": "2017-07-10T16:00:00.000Z", "dateReserved": "2017-06-21T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:26.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1275 (GCVE-0-2009-1275)
Vulnerability from cvelistv5
Published
2009-04-09 15:00
Modified
2024-08-07 05:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:04:49.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/struts/browse/TILES-351" }, { "name": "34657", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34657" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-29T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/struts/browse/TILES-351" }, { "name": "34657", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34657" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1275", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/struts/browse/TILES-351", "refsource": "CONFIRM", "url": "https://issues.apache.org/struts/browse/TILES-351" }, { "name": "34657", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34657" }, { "name": "http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1275", "datePublished": "2009-04-09T15:00:00", "dateReserved": "2009-04-09T00:00:00", "dateUpdated": "2024-08-07T05:04:49.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9805 (GCVE-0-2017-9805)
Vulnerability from cvelistv5
Published
2017-09-15 19:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- RCE
Summary
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: Apache Struts before 2.3.34 and 2.5.x before 2.5.13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-052.html" }, { "name": "1039263", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039263" }, { "name": "100609", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100609" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488482" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax" }, { "name": "42627", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42627/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-052" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170907-0001/" }, { "name": "VU#112992", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/112992" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-9805", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T21:07:51.564352Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9805" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:23.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2017-9805 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Apache Struts before 2.3.34 and 2.5.x before 2.5.13" } ] } ], "datePublic": "2017-09-15T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads." } ], "problemTypes": [ { "descriptions": [ { "description": "RCE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-052.html" }, { "name": "1039263", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039263" }, { "name": "100609", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100609" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488482" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax" }, { "name": "42627", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42627/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-052" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170907-0001/" }, { "name": "VU#112992", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/112992" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-9805", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "Apache Struts before 2.3.34 and 2.5.x before 2.5.13" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "RCE" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "https://struts.apache.org/docs/s2-052.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-052.html" }, { "name": "1039263", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039263" }, { "name": "100609", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100609" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1488482", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488482" }, { "name": "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax", "refsource": "CONFIRM", "url": "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax" }, { "name": "42627", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42627/" }, { "name": "https://lgtm.com/blog/apache_struts_CVE-2017-9805", "refsource": "MISC", "url": "https://lgtm.com/blog/apache_struts_CVE-2017-9805" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-052", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-052" }, { "name": "https://security.netapp.com/advisory/ntap-20170907-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170907-0001/" }, { "name": "VU#112992", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/112992" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9805", "datePublished": "2017-09-15T19:00:00.000Z", "dateReserved": "2017-06-21T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:23.770Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-0899 (GCVE-0-2015-0899)
Vulnerability from cvelistv5
Published
2016-07-04 22:00
Modified
2024-08-06 04:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:26:11.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "name": "JVNDB-2015-000042", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042" }, { "name": "JVN#86448949", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN86448949/index.html" }, { "name": "DSA-3536", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3536" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN" }, { "name": "74423", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74423" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "name": "JVNDB-2015-000042", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042" }, { "name": "JVN#86448949", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN86448949/index.html" }, { "name": "DSA-3536", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3536" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN" }, { "name": "74423", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74423" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-0899", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20180629-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0006/" }, { "name": "JVNDB-2015-000042", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042" }, { "name": "JVN#86448949", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN86448949/index.html" }, { "name": "DSA-3536", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3536" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN", "refsource": "CONFIRM", "url": "https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-EN" }, { "name": "74423", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74423" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-0899", "datePublished": "2016-07-04T22:00:00", "dateReserved": "2015-01-08T00:00:00", "dateUpdated": "2024-08-06T04:26:11.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0094 (GCVE-0-2014-0094)
Vulnerability from cvelistv5
Published
2014-03-10 14:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:37.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "name": "59178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59178" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.konakart.com/downloads/ver-7-3-0-0-whats-new" }, { "name": "20140306 [ANN] Struts 2.3.16.1 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531362/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "name": "JVN#19294237", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-020.html" }, { "name": "JVNDB-2014-000045", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "name": "56440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56440" }, { "name": "1029876", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029876" }, { "name": "20140625 NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "name": "65999", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65999" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to \"manipulate\" the ClassLoader via the class parameter, which is passed to the getClass method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:52", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "name": "59178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59178" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.konakart.com/downloads/ver-7-3-0-0-whats-new" }, { "name": "20140306 [ANN] Struts 2.3.16.1 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531362/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "name": "JVN#19294237", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-020.html" }, { "name": "JVNDB-2014-000045", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "name": "56440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56440" }, { "name": "1029876", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029876" }, { "name": "20140625 NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "name": "65999", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65999" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to \"manipulate\" the ClassLoader via the class parameter, which is passed to the getClass method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "name": "59178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59178" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "name": "http://www.konakart.com/downloads/ver-7-3-0-0-whats-new", "refsource": "CONFIRM", "url": "http://www.konakart.com/downloads/ver-7-3-0-0-whats-new" }, { "name": "20140306 [ANN] Struts 2.3.16.1 GA release available - security fix", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531362/100/0/threaded" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "name": "JVN#19294237", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "name": "http://struts.apache.org/release/2.3.x/docs/s2-020.html", "refsource": "CONFIRM", "url": "http://struts.apache.org/release/2.3.x/docs/s2-020.html" }, { "name": "JVNDB-2014-000045", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "name": "56440", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56440" }, { "name": "1029876", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029876" }, { "name": "20140625 NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "name": "65999", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65999" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0094", "datePublished": "2014-03-10T14:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:37.910Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-3081 (GCVE-0-2016-3081)
Vulnerability from cvelistv5
Published
2016-04-26 14:00
Modified
2024-08-05 23:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:40:15.633Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1035665", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035665" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-032.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160527-01-struts2-en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/http/struts_dmi_exec" }, { "name": "39756", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39756/" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html" }, { "name": "87327", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/87327" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/struts_dmi_exec" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1035665", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035665" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-032.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160527-01-struts2-en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/linux/http/struts_dmi_exec" }, { "name": "39756", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39756/" }, { "name": "91787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91787" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html" }, { "name": "87327", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/87327" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/struts_dmi_exec" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-3081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1035665", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035665" }, { "name": "https://struts.apache.org/docs/s2-032.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-032.html" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160527-01-struts2-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160527-01-struts2-en" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "http://www.rapid7.com/db/modules/exploit/linux/http/struts_dmi_exec", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/linux/http/struts_dmi_exec" }, { "name": "39756", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39756/" }, { "name": "91787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91787" }, { "name": "http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136856/Apache-Struts-2.3.28-Dynamic-Method-Invocation-Remote-Code-Execution.html" }, { "name": "87327", "refsource": "BID", "url": "http://www.securityfocus.com/bid/87327" }, { "name": "http://www.rapid7.com/db/modules/exploit/multi/http/struts_dmi_exec", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/multi/http/struts_dmi_exec" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-3081", "datePublished": "2016-04-26T14:00:00", "dateReserved": "2016-03-10T00:00:00", "dateUpdated": "2024-08-05T23:40:15.633Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0112 (GCVE-0-2014-0112)
Vulnerability from cvelistv5
Published
2014-04-29 10:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:38.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "name": "59178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59178" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "name": "20140426 [ANN] Struts 2.3.16.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "name": "59500", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59500" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "67064", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67064" }, { "name": "JVN#19294237", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "name": "JVNDB-2014-000045", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091939" }, { "name": "20140625 NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "name": "RHSA-2019:0910", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0910" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:52", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "name": "59178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59178" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "name": "20140426 [ANN] Struts 2.3.16.2 GA release available - security fix", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "name": "59500", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59500" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "67064", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67064" }, { "name": "JVN#19294237", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "name": "JVNDB-2014-000045", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091939" }, { "name": "20140625 NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "name": "RHSA-2019:0910", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0910" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-021", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-021" }, { "name": "59178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59178" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0007.html" }, { "name": "20140426 [ANN] Struts 2.3.16.2 GA release available - security fix", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531952/100/0/threaded" }, { "name": "59500", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59500" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "67064", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67064" }, { "name": "JVN#19294237", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN19294237/index.html" }, { "name": "JVNDB-2014-000045", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21676706" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1091939", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091939" }, { "name": "20140625 NEW VMSA-2014-0007 - VMware product updates address security vulnerabilities in Apache Struts library", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532549/100/0/threaded" }, { "name": "RHSA-2019:0910", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0910" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0112", "datePublished": "2014-04-29T10:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:38.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-5638 (GCVE-0-2017-5638)
Vulnerability from cvelistv5
Published
2017-03-11 02:11
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3.x before 2.3.32 Version: 2.5.x before 2.5.10.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:04:15.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "name": "41570", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://exploit-db.com/exploits/41570" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-046.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "name": "VU#834067", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/834067" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://isc.sans.edu/diary/22169" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-045.html" }, { "name": "1037973", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037973" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "name": "96729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96729" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/theog150/status/841146956135124993" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mazen160/struts-pwn" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "name": "41614", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41614/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-5638", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T21:06:33.860690Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5638" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:32.059Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2017-5638 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3.x before 2.3.32" }, { "status": "affected", "version": "2.5.x before 2.5.10.1" } ] } ], "datePublic": "2017-03-06T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-24T03:06:34.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "name": "41570", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://exploit-db.com/exploits/41570" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-046.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "name": "VU#834067", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/834067" }, { "tags": [ "x_refsource_MISC" ], "url": "https://isc.sans.edu/diary/22169" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-045.html" }, { "name": "1037973", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037973" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "name": "96729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96729" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/theog150/status/841146956135124993" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mazen160/struts-pwn" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "name": "41614", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41614/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5638", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.3.x before 2.3.32" }, { "version_value": "2.5.x before 2.5.10.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html", "refsource": "MISC", "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "name": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/", "refsource": "MISC", "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "name": "41570", "refsource": "EXPLOIT-DB", "url": "https://exploit-db.com/exploits/41570" }, { "name": "https://security.netapp.com/advisory/ntap-20170310-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "name": "https://github.com/rapid7/metasploit-framework/issues/8064", "refsource": "MISC", "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "name": "https://struts.apache.org/docs/s2-046.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-046.html" }, { "name": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html", "refsource": "MISC", "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "name": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/", "refsource": "MISC", "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "name": "VU#834067", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/834067" }, { "name": "https://isc.sans.edu/diary/22169", "refsource": "MISC", "url": "https://isc.sans.edu/diary/22169" }, { "name": "https://struts.apache.org/docs/s2-045.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-045.html" }, { "name": "1037973", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037973" }, { "name": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html", "refsource": "MISC", "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "name": "96729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96729" }, { "name": "https://twitter.com/theog150/status/841146956135124993", "refsource": "MISC", "url": "https://twitter.com/theog150/status/841146956135124993" }, { "name": "https://github.com/mazen160/struts-pwn", "refsource": "MISC", "url": "https://github.com/mazen160/struts-pwn" }, { "name": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "name": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145", "refsource": "CONFIRM", "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "name": "https://support.lenovo.com/us/en/product_security/len-14200", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "name": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a", "refsource": "CONFIRM", "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "name": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228", "refsource": "CONFIRM", "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-045", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "name": "41614", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41614/" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-046", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "name": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/", "refsource": "MISC", "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-5638", "datePublished": "2017-03-11T02:11:00.000Z", "dateReserved": "2017-01-29T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:32.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0838 (GCVE-0-2012-0838)
Vulnerability from cvelistv5
Published
2012-03-02 22:00
Modified
2024-08-06 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2012-000012", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.3.1.2/docs/s2-007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "name": "JVN#79099262", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN79099262/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-03-02T22:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "JVNDB-2012-000012", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.3.1.2/docs/s2-007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3668" }, { "name": "JVN#79099262", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN79099262/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0838", "datePublished": "2012-03-02T22:00:00Z", "dateReserved": "2012-01-19T00:00:00Z", "dateUpdated": "2024-08-06T18:38:14.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-31805 (GCVE-0-2021-31805)
Vulnerability from cvelistv5
Published
2022-04-12 15:25
Modified
2024-08-03 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-917 - Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
Summary
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.0.0 to 2.5.29 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:10:30.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-062" }, { "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.0.0 to 2.5.29" } ] } ], "credits": [ { "lang": "en", "value": "Apache Struts would like to thank Chris McCown for reporting this issue!" } ], "descriptions": [ { "lang": "en", "value": "The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag\u2019s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-917", "description": "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-25T16:27:57", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-062" }, { "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "workarounds": [ { "lang": "en", "value": "Avoid using forced OGNL evaluation on untrusted user input, and/or upgrade to Struts 2.5.30 which checks if expression evaluation won\u2019t lead to the double evaluation.\n\nPlease read our Security Bulletin S2-062 for more details." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-31805", "STATE": "PUBLIC", "TITLE": "Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.0.0 to 2.5.29" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache Struts would like to thank Chris McCown for reporting this issue!" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag\u2019s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ {} ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwiki.apache.org/confluence/display/WW/S2-062", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/WW/S2-062" }, { "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220420-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" } ] }, "source": { "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "Avoid using forced OGNL evaluation on untrusted user input, and/or upgrade to Struts 2.5.30 which checks if expression evaluation won\u2019t lead to the double evaluation.\n\nPlease read our Security Bulletin S2-062 for more details." } ] } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-31805", "datePublished": "2022-04-12T15:25:11", "dateReserved": "2021-04-26T00:00:00", "dateUpdated": "2024-08-03T23:10:30.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5169 (GCVE-0-2015-5169)
Vulnerability from cvelistv5
Published
2017-09-25 21:00
Modified
2024-08-06 06:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "name": "76625", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76625" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-025.html" }, { "name": "JVNDB-2015-000125", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000125.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087" }, { "name": "JVN#95989300", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN95989300/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-30T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "name": "76625", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76625" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-025.html" }, { "name": "JVNDB-2015-000125", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000125.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087" }, { "name": "JVN#95989300", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN95989300/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20180629-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" }, { "name": "76625", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76625" }, { "name": "https://struts.apache.org/docs/s2-025.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-025.html" }, { "name": "JVNDB-2015-000125", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000125.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260087" }, { "name": "JVN#95989300", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN95989300/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5169", "datePublished": "2017-09-25T21:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-17530 (GCVE-0-2020-17530)
Vulnerability from cvelistv5
Published
2020-12-11 01:11
Modified
2025-07-30 01:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: Struts 2.0.0 - Struts 2.5.25 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:00:48.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" }, { "name": "JVN#43969166", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN43969166/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-17530", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T20:53:17.181618Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-17530" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-917", "description": "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:45:30.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2020-17530 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Struts 2.0.0 - Struts 2.5.25" } ] } ], "descriptions": [ { "lang": "en", "value": "Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:21:54.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" }, { "name": "JVN#43969166", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN43969166/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2020-17530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "Struts 2.0.0 - Struts 2.5.25" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwiki.apache.org/confluence/display/WW/S2-061", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-061" }, { "name": "JVN#43969166", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN43969166/index.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210115-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/04/12/6" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2020-17530", "datePublished": "2020-12-11T01:11:04.000Z", "dateReserved": "2020-08-12T00:00:00.000Z", "dateUpdated": "2025-07-30T01:45:30.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34149 (GCVE-0-2023-34149)
Vulnerability from cvelistv5
Published
2023-06-14 07:48
Modified
2025-02-13 16:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 0 ≤ 2.5.30 Version: 0 ≤ 6.1.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-063" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/14/2" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34149", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T14:02:16.387877Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T14:02:26.381Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.5.30", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Matthew McClain" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.\u003cp\u003eThis issue affects Apache Struts: through 2.5.30, through 6.1.2.\u003c/p\u003e\u003cp\u003eUpgrade to Struts 2.5.31 or 6.1.2.1 or greater.\u003cbr\u003e\u003c/p\u003e" } ], "value": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.\n\nUpgrade to Struts 2.5.31 or 6.1.2.1 or greater." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T18:06:15.516Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-063" }, { "url": "http://www.openwall.com/lists/oss-security/2023/06/14/2" }, { "url": "https://security.netapp.com/advisory/ntap-20230706-0005/" } ], "source": { "advisory": "S2-063", "discovery": "EXTERNAL" }, "title": "Apache Struts: DoS via OOM owing to not properly checking of list bounds", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-34149", "datePublished": "2023-06-14T07:48:54.926Z", "dateReserved": "2023-05-28T09:33:09.462Z", "dateUpdated": "2025-02-13T16:55:20.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1548 (GCVE-0-2006-1548)
Vulnerability from cvelistv5
Published
2006-03-30 22:00
Modified
2024-08-07 17:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:48.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "struts-lookupmap-xss(25614)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25614" }, { "name": "1015856", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015856" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "name": "ADV-2006-1205", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "name": "17342", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17342" }, { "name": "19493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19493" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/struts/browse/STR-2781" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38749" }, { "name": "SUSE-SR:2006:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "name": "20117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "struts-lookupmap-xss(25614)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25614" }, { "name": "1015856", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015856" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "name": "ADV-2006-1205", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "name": "17342", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17342" }, { "name": "19493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19493" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/struts/browse/STR-2781" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38749" }, { "name": "SUSE-SR:2006:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "name": "20117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20117" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-1548", "datePublished": "2006-03-30T22:00:00", "dateReserved": "2006-03-30T00:00:00", "dateUpdated": "2024-08-07T17:19:48.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-1006 (GCVE-0-2012-1006)
Vulnerability from cvelistv5
Published
2012-02-07 02:00
Modified
2024-08-06 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:26.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secpod.org/blog/?p=450" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "name": "apache-struts-multiple-xss(72888)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888" }, { "name": "51902", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51902" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secpod.org/blog/?p=450" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "name": "apache-struts-multiple-xss(72888)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888" }, { "name": "51902", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51902" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-1006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secpod.org/blog/?p=450", "refsource": "MISC", "url": "http://secpod.org/blog/?p=450" }, { "name": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt", "refsource": "MISC", "url": "http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt" }, { "name": "apache-struts-multiple-xss(72888)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72888" }, { "name": "51902", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51902" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-1006", "datePublished": "2012-02-07T02:00:00", "dateReserved": "2012-02-06T00:00:00", "dateUpdated": "2024-08-06T18:45:26.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0116 (GCVE-0-2014-0116)
Vulnerability from cvelistv5
Published
2014-05-08 10:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:38.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "67218", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67218" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-022.html" }, { "name": "59816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59816" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to \"manipulate\" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "67218", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67218" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/release/2.3.x/docs/s2-022.html" }, { "name": "59816", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59816" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0116", "datePublished": "2014-05-08T10:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:38.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6795 (GCVE-0-2016-6795)
Vulnerability from cvelistv5
Published
2017-09-20 17:00
Modified
2024-09-17 02:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Possible path traversal in the Convention plugin
Summary
In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3.x before 2.3.31 Version: 2.5.x before 2.5.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:37.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93773", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93773" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3.x before 2.3.31" }, { "status": "affected", "version": "2.5.x before 2.5.5" } ] } ], "datePublic": "2016-10-18T00:00:00", "descriptions": [ { "lang": "en", "value": "In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side." } ], "problemTypes": [ { "descriptions": [ { "description": "Possible path traversal in the Convention plugin", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "93773", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93773" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2016-10-18T00:00:00", "ID": "CVE-2016-6795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.3.x before 2.3.31" }, { "version_value": "2.5.x before 2.5.5" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Possible path traversal in the Convention plugin" } ] } ] }, "references": { "reference_data": [ { "name": "93773", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93773" }, { "name": "https://struts.apache.org/docs/s2-042.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-042.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-6795", "datePublished": "2017-09-20T17:00:00Z", "dateReserved": "2016-08-12T00:00:00", "dateUpdated": "2024-09-17T02:33:08.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0233 (GCVE-0-2019-0233)
Vulnerability from cvelistv5
Published
2020-09-14 16:50
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache Struts |
Version: Apache Struts 2.0.0 to 2.5.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:15.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-060" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache Struts 2.0.0 to 2.5.20" } ] } ], "descriptions": [ { "lang": "en", "value": "An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-20T10:38:16", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/ww/s2-060" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "Apache Struts 2.0.0 to 2.5.20" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwiki.apache.org/confluence/display/ww/s2-060", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/ww/s2-060" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://launchpad.support.sap.com/#/notes/2982840", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2982840" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0233", "datePublished": "2020-09-14T16:50:11", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:15.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-15707 (GCVE-0-2017-15707)
Vulnerability from cvelistv5
Published
2017-12-01 16:00
Modified
2024-09-16 22:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- DoS attack
Summary
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.5 to 2.5.14 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:04:48.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-054" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "1039946", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039946" }, { "name": "102021", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102021" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171214-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.5 to 2.5.14" } ] } ], "datePublic": "2017-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS attack", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-18T12:57:01", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-054" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "1039946", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039946" }, { "name": "102021", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102021" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171214-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-11-30T00:00:00", "ID": "CVE-2017-15707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.5 to 2.5.14" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS attack" } ] } ] }, "references": { "reference_data": [ { "name": "https://cwiki.apache.org/confluence/display/WW/S2-054", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-054" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "1039946", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039946" }, { "name": "102021", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102021" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171214-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171214-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-15707", "datePublished": "2017-12-01T16:00:00Z", "dateReserved": "2017-10-21T00:00:00", "dateUpdated": "2024-09-16T22:01:58.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-4387 (GCVE-0-2012-4387)
Vulnerability from cvelistv5
Published
2012-09-05 23:00
Modified
2024-08-06 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "apache-struts-parameters-dos(78183)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78183" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/2.x/docs/s2-011.html" }, { "name": "[oss-security] 20120901 Re: CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "name": "50420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50420" }, { "name": "55346", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55346" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/WW-3860" }, { "name": "[oss-security] 20120901 CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "apache-struts-parameters-dos(78183)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78183" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/2.x/docs/s2-011.html" }, { "name": "[oss-security] 20120901 Re: CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/5" }, { "name": "50420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50420" }, { "name": "55346", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55346" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/jira/browse/WW-3860" }, { "name": "[oss-security] 20120901 CVE request: Apache Struts S2-010 and S2-011", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/01/4" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4387", "datePublished": "2012-09-05T23:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9793 (GCVE-0-2017-9793)
Vulnerability from cvelistv5
Published
2017-09-20 17:00
Modified
2024-09-16 20:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- A remote attacker may create a DoS attack by sending crafted xml request when using the Struts REST plugin
Summary
The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3.7 - 2.3.33 Version: 2.5 - 2.5.12 Version: 2.1.x series |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "1039262", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039262" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-051.html" }, { "name": "100611", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100611" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3.7 - 2.3.33" }, { "status": "affected", "version": "2.5 - 2.5.12" }, { "status": "affected", "version": "2.1.x series" } ] } ], "datePublic": "2017-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload." } ], "problemTypes": [ { "descriptions": [ { "description": "A remote attacker may create a DoS attack by sending crafted xml request when using the Struts REST plugin", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-12T20:45:53", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "1039262", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039262" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-051.html" }, { "name": "100611", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100611" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-09-05T00:00:00", "ID": "CVE-2017-9793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.3.7 - 2.3.33" }, { "version_value": "2.5 - 2.5.12" }, { "version_value": "2.1.x series" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "A remote attacker may create a DoS attack by sending crafted xml request when using the Struts REST plugin" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html" }, { "name": "1039262", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039262" }, { "name": "20170907 Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" }, { "name": "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm", "refsource": "CONFIRM", "url": "http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm" }, { "name": "https://security.netapp.com/advisory/ntap-20180629-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180629-0001/" }, { "name": "https://struts.apache.org/docs/s2-051.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-051.html" }, { "name": "100611", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100611" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9793", "datePublished": "2017-09-20T17:00:00Z", "dateReserved": "2017-06-21T00:00:00", "dateUpdated": "2024-09-16T20:12:54.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-53677 (GCVE-0-2024-53677)
Vulnerability from cvelistv5
Published
2024-12-11 15:35
Modified
2025-01-03 12:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- File upload logic is flawed
Summary
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.0.0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-53677", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-16T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T04:55:35.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-01-03T12:04:30.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250103-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "packageName": "org.apache.struts:struts2-core", "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "6.4.0", "status": "affected", "version": "2.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eFile upload logic in Apache Struts is flawed.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 6.4.0 at least and \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003emigrate to the new \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://struts.apache.org/core-developers/file-upload\"\u003efile upload mechanism\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. If you are not using an old file upload logic based on\u0026nbsp;\u003cb\u003eFileuploadInterceptor\u003c/b\u003e\u0026nbsp;your application is safe.\u003c/span\u003e\u003c/p\u003eYou can find more details in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwiki.apache.org/confluence/display/WW/S2-067\"\u003ehttps://cwiki.apache.org/confluence/display/WW/S2-067\u003c/a\u003e" } ], "value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067" } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "AUTOMATIC", "Safety": "NEGLIGIBLE", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 9.5, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "RED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "LOW" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "File upload logic is flawed", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-20T15:50:38.224Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-067" } ], "source": { "advisory": "S2-067", "discovery": "EXTERNAL" }, "title": "Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-53677", "datePublished": "2024-12-11T15:35:43.389Z", "dateReserved": "2024-11-21T17:02:02.847Z", "dateUpdated": "2025-01-03T12:04:30.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-1546 (GCVE-0-2006-1546)
Vulnerability from cvelistv5
Published
2006-03-30 22:00
Modified
2024-08-07 17:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:19:47.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[struts-user] 20060121 Validation Security Hole?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/struts-user/200601.mbox/%3c20060121221800.15814.qmail%40web32607.mail.mud.yahoo.com%3e" }, { "name": "1015856", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015856" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "name": "ADV-2006-1205", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "name": "17342", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17342" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38374" }, { "name": "19493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19493" }, { "name": "struts-iscancelled-security-bypass(25612)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25612" }, { "name": "SUSE-SR:2006:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "name": "20117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20117" }, { "name": "[struts-devel] 20060122 Re: Validation Security Hole?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/struts-dev/200601.mbox/%3cdr169r%24623%242%40sea.gmane.org%3e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a \u0027org.apache.struts.taglib.html.Constants.CANCEL\u0027 parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[struts-user] 20060121 Validation Security Hole?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/struts-user/200601.mbox/%3c20060121221800.15814.qmail%40web32607.mail.mud.yahoo.com%3e" }, { "name": "1015856", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015856" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html" }, { "name": "ADV-2006-1205", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1205" }, { "name": "17342", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17342" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://issues.apache.org/bugzilla/show_bug.cgi?id=38374" }, { "name": "19493", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19493" }, { "name": "struts-iscancelled-security-bypass(25612)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25612" }, { "name": "SUSE-SR:2006:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "name": "20117", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20117" }, { "name": "[struts-devel] 20060122 Re: Validation Security Hole?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/struts-dev/200601.mbox/%3cdr169r%24623%242%40sea.gmane.org%3e" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-1546", "datePublished": "2006-03-30T22:00:00", "dateReserved": "2006-03-30T00:00:00", "dateUpdated": "2024-08-07T17:19:47.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }