struts2-core is vulnerable to remote code execution (RCE) attacks. These attacks are possible when using a namespace
or url
tag which doesn’t have a value
and action
set and where its upper action configuration is using a wildcard namespace
or has no namespace
.
www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt
www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html
www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
www.securityfocus.com/bid/105125
www.securitytracker.com/id/1041547
www.securitytracker.com/id/1041888
cwiki.apache.org/confluence/display/WW/S2-057
github.com/apache/struts/commit/6e87474f9ad0549f07dd2c37d50a9ccd0977c6e5
github.com/apache/struts/commit/918182344cc97515353cc3dcb09b9fce19c739c0
github.com/hook-s3c/CVE-2018-11776-Python-PoC
lgtm.com/blog/apache_struts_CVE-2018-11776
lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012
security.netapp.com/advisory/ntap-20180822-0001/
security.netapp.com/advisory/ntap-20181018-0002/
www.exploit-db.com/exploits/45260/
www.exploit-db.com/exploits/45262/
www.exploit-db.com/exploits/45367/
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html