[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77982

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2017-9805

Date: (C)2017-09-19   (M)2017-10-12
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











The REST Plugin in Apache Struts 2.1.2 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

Reference:
BID-100609
SECTRACK-1039263
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2
EXPLOIT-DB-42627
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax
https://bugzilla.redhat.com/show_bug.cgi?id=1488482
https://cwiki.apache.org/confluence/display/WW/S2-052
https://struts.apache.org/docs/s2-052.html

CPE    33
cpe:/a:apache:struts:2.3.3
cpe:/a:apache:struts:2.3.15.2
cpe:/a:apache:struts:2.3.15.3
cpe:/a:apache:struts:2.3.15.1
...
CWE    1
CWE-502
OVAL    1
oval:org.secpod.oval:def:41911

© 2013 SecPod Technologies