9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
struts2-struts1-plugin is vulnerable to remote code execution (RCE) attacks. These attacks are possible because the user input are not sanitized and are directly passed through messages.add()
to be used as a part of an error message in the ActionMessage
class. This doesnβt affect users of the Struts 2.5.x series or applications that do not use the Struts 1 plugin.
CPE | Name | Operator | Version |
---|---|---|---|
struts 2 showcase webapp | le | 2.3.32 |
seclists.org/oss-sec/2017/q3/92
struts.apache.org/docs/s2-048.html
www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
www.securityfocus.com/bid/99484
www.securitytracker.com/id/1038838
github.com/apache/struts/commit/73da12e723c2737bd515946588ddcd898acf584a
github.com/nixawk/labs/issues/8
securingtomorrow.mcafee.com/mcafee-labs/analyzing-cve-2017-9791-apache-struts-vulnerability-can-lead-remote-code-execution/
security.netapp.com/advisory/ntap-20180706-0002/
www.exploit-db.com/exploits/42324/
www.exploit-db.com/exploits/44643/
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P