CVE-2007-6726
https://notcve.org/view.php?id=CVE-2007-6726
Multiple cross-site scripting (XSS) vulnerabilities in Dojo 0.4.1 and 0.4.2, as used in Apache Struts and other products, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) xip_client.html and (2) xip_server.html in src/io/. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) Dojo v0.4.1 y v0.4.2, como el utilizado en Apache Struts y otros productos, permite a atacantes remotos inyectar web script o HTML de su elección a través de vectores no especificados inplicando a (1) xip_client.html y (2) xip_server.html en src/io/. • http://www.dojotoolkit.org/0-4-3-and-updated-0-4-1-0-4-2-builds http://www.dojotoolkit.org/2007/05/26/0-4-3-released-0-4-2-and-0-4-1-users-should-upgrade-immediately http://www.dojotoolkit.org/releaseNotes/0.4.3 http://www.securityfocus.com/bid/34660 https://exchange.xforce.ibmcloud.com/vulnerabilities/49884 https://issues.apache.org/struts/browse/WW-2134 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-6682
https://notcve.org/view.php?id=CVE-2008-6682
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) " (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Apache Struts v2.0.x anteriores a v2.0.11.1 y v2.1.x anteriores a v2.1.1 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de vectores asociados con el manejo no adecuado de (1) " (comillas doble) en el atributo href en una etiqueta s:a, y (2) parámetros en el atributo acción de una etiqueta s:url. • http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449.html http://www.nabble.com/Feedback%3A-WW-2414%2C-XSS-attack-is-possible-if-using-%3Cs%3Aurl-...%3E-and-%3Cs%3Aa-...%3E-td14771449i20.html http://www.securityfocus.com/bid/34686 https://issues.apache.org/struts/browse/WW-2414 https://issues.apache.org/struts/browse/WW-2427 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-6504 – XWork < 2.0.11.2 - 'ParameterInterceptor' Class OGNL Security Bypass
https://notcve.org/view.php?id=CVE-2008-6504
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character. ParametersInterceptor en OpenSymphony XWork 2.0.x antes de 2.0.6 y 2.1.x antes de 2.1.2, tal como se utiliza en Apache Struts y otros productos, no restringe adecuadamente las referencias # (almohadilla) a objetos de contexto, lo que permite a atacantes remotos ejecutar sentencias OGNL (Object-Graph Navigation Language) y modificar los objetos del contexto del lado del servidor contexto objetos, como lo demuestra el uso de una representación \u0023 del carácter #. • https://www.exploit-db.com/exploits/32564 http://fisheye6.atlassian.com/cru/CR-9 http://issues.apache.org/struts/browse/WW-2692 http://jira.opensymphony.com/browse/XW-641 http://osvdb.org/49732 http://secunia.com/advisories/32495 http://secunia.com/advisories/32497 http://struts.apache.org/2.x/docs/s2-003.html http://www.securityfocus.com/bid/32101 http://www.vupen.com/english/advisories/2008/3003 http://www.vupen.com/english/advisories/2008/3004 https: • CWE-20: Improper Input Validation •
CVE-2008-6505 – Struts 2.0.11 - Multiple Directory Traversal Vulnerabilities
https://notcve.org/view.php?id=CVE-2008-6505
Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x. Múltiples vulnerabilidades de salto de directorio en Apache Struts v2.0.x anteriores a v2.0.12 y v2.1.x anteriores a v2.1.3, permite a atacantes remotos leer ficheros de su elección a través de ..%25f (punto punto barra, codificado) en una dirección Web con /struts/ path, relativo a (1) FilterDispatcher en v2.0.x y (2)DefaultStaticContentLoader en v2.1.x. • https://www.exploit-db.com/exploits/32565 http://issues.apache.org/struts/browse/WW-2779 http://osvdb.org/49733 http://osvdb.org/49734 http://secunia.com/advisories/32497 http://struts.apache.org/2.x/docs/s2-004.html http://www.securityfocus.com/bid/32104 http://www.vupen.com/english/advisories/2008/3003 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •