9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%
Vulnerability ID: CVE-2017-9791
Vulnerability author: icez ic3z#qq.com
Affected version: Struts 2.3. x
Vulnerability rating: high risk
Vulnerability Brief Description: When the Struts 2 in Struts 1 Plug-in is enabled, an attacker through the use of malicious field values may cause the RCE. These untrusted input data is brought into the ActionMessage class in the error message.
Temporary solution:
Developers through the use of resource keys replace the original message is passed directly to the ActionMessage in the way. As shown below
messages. add(“msg”, new ActionMessage(“struts1. gangsterAdded”, gform. getName()));
Must not be used in the following manner
messages. add(“msg”, new ActionMessage(“Gangster” + gform. getName() + “was added”));
Verification screenshot
! [](/Article/UploadPic/2017-7/201778111753855. png? www. myhack58. com)
Reference links
https://cwiki.apache.org/confluence/display/WW/S2-048
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.974 High
EPSS
Percentile
99.9%