CVE-2011-3923 – Apache Struts - 'ParametersInterceptor' Remote Code Execution
https://notcve.org/view.php?id=CVE-2011-3923
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands. Apache Struts versiones anteriores a 2.3.1.2, permite a atacantes remotos omitir las protecciones de seguridad en la clase ParameterInterceptor y ejecutar comandos arbitrarios. • https://www.exploit-db.com/exploits/24874 http://seclists.org/fulldisclosure/2014/Jul/38 http://www.exploit-db.com/exploits/24874 http://www.securityfocus.com/bid/51628 http://www.securitytracker.com/id?1026575 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923 https://exchange.xforce.ibmcloud.com/vulnerabilities/72585 https://security-tracker.debian.org/tracker/CVE-2011-3923 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2012-4386
https://notcve.org/view.php?id=CVE-2012-4386
The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute. El mecanismo de control token en Apache Struts v2.0.0 a través de v2.3.4 no valida correctamente el parámetro de configuración name permitiendo a atacantes remotos realizar ataques de falsificaciones de petición en sitios cruzados (CSRF) estableciendo el parámetro name de la configuración simbólica a un atributo de sesión • http://secunia.com/advisories/50420 http://struts.apache.org/2.x/docs/s2-010.html http://www.openwall.com/lists/oss-security/2012/09/01/4 http://www.openwall.com/lists/oss-security/2012/09/01/5 http://www.securityfocus.com/bid/55346 https://exchange.xforce.ibmcloud.com/vulnerabilities/78182 https://issues.apache.org/jira/browse/WW-3858 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2012-4387
https://notcve.org/view.php?id=CVE-2012-4387
Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression. Apache Struts v2.0.0 a través de v2.3.4 permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) a través de un nombre de parámetro largo, que se procesa como una expresión OGNL ... • http://secunia.com/advisories/50420 http://struts.apache.org/2.x/docs/s2-011.html http://www.openwall.com/lists/oss-security/2012/09/01/4 http://www.openwall.com/lists/oss-security/2012/09/01/5 http://www.securityfocus.com/bid/55346 https://exchange.xforce.ibmcloud.com/vulnerabilities/78183 https://issues.apache.org/jira/browse/WW-3860 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-0838
https://notcve.org/view.php?id=CVE-2012-0838
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. Apache Struts 2 anteriores a 2.2.3.1 evalúa una cadena como una expresión OGNL durante el manejo de un error de conversión, lo que permite a atacantes remotos modificar valores de datos de tiempo de ejecución y, por lo tanto, ejecutar código arbitrario, a través de una entrada inválida de un campo. • http://jvn.jp/en/jp/JVN79099262/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012 http://struts.apache.org/2.3.1.2/docs/s2-007.html https://issues.apache.org/jira/browse/WW-3668 • CWE-20: Improper Input Validation •
CVE-2012-1007 – Apache Struts - Multiple Persistent Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2012-1007
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en Apache Struts v1.3.10 permiten a atacantes remotos inyectar secuencias de comandos web o HTML a través de (1) el parámetro 'name' de struts-examples/upload/upload-submit.do, o el parámetro 'message' de (2) struts-cookbook/processSimple.do o (3) struts-cookbook/processDyna.do. • https://www.exploit-db.com/exploits/18452 http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt http://secpod.org/blog/?p=450 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/51900 https://exchange.xforce.ibmcloud.com/vulnerabilities/73052 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •