10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%
Name | struts_ognl |
---|---|
CVE | CVE-2017-5638 Exploit Pack |
VENDOR: Apache | |
NOTES: | |
The JAR Server will listen on the port provided in the UI. However, if that port is unavailable, | |
a random one will be chosen. |
Example vulnerable application: struts2-showcase in Struts 2.3.31 .
Example URL: http://172.16.196.137:8080/struts2-showcase/showcase.action
Versions tested:
> Ubuntu Linux 14.04.3
Java 7u22/Tomcat 8.5.11/Struts 2.3.31
Repeatability: One shot
References: [‘http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/’, ‘http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html’, ‘https://github.com/tengzhangchao/Struts2_045-Poc’]
CVE Url: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%