Page 2 of 21 results (0.010 seconds)

CVSS: 9.8EPSS: 97%CPEs: 13EXPL: 11

Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. Una evaluación OGNL forzada, cuando se evalúa según la entrada del usuario sin procesar en los atributos de la etiqueta, puede conllevar a una ejecución de código remota. Software afectado: Apache Struts versión 2.0.0 - Struts versión 2.5.25 The Apache Struts framework, when forced, performs double evaluation of attribute values assigned to certain tags attributes such as id. It is therefore possible to pass in a value to Struts that will be evaluated again when a tag's attributes are rendered. • https://github.com/wuzuowei/CVE-2020-17530 https://github.com/ka1n4t/CVE-2020-17530 https://github.com/Al1ex/CVE-2020-17530 https://github.com/phil-fly/CVE-2020-17530 https://github.com/CyborgSecurity/CVE-2020-17530 https://github.com/fengziHK/CVE-2020-17530-strust2-061 https://github.com/uzzzval/CVE-2020-17530 https://github.com/nth347/CVE-2020-17530 https://github.com/secpool2000/CVE-2020-17530 https://github.com/keyuan15/CVE-2020-17530 https://github.com/kil • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 7.5EPSS: 9%CPEs: 6EXPL: 0

An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload. Una anulación del permiso de acceso en Apache Struts versiones 2.0.0 hasta 2.5.20, puede causar una Denegación de Servicio al llevar a cabo una carga de archivo • https://cwiki.apache.org/confluence/display/ww/s2-060 https://launchpad.support.sap.com/#/notes/2982840 https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2021.html • CWE-281: Improper Preservation of Permissions •

CVSS: 9.8EPSS: 95%CPEs: 6EXPL: 9

Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Apache Struts versiones 2.0.0 hasta 2.5.20, forzó una evaluación OGNL doble, cuando se evaluaba en la entrada del usuario sin procesar en los atributos de la etiqueta, puede conllevar a una ejecución de código remota The Apache Struts framework, when forced, performs double evaluation of attribute values assigned to certain tags attributes such as id. It is therefore possible to pass in a value to Struts that will be evaluated again when a tag's attributes are rendered. With a carefully crafted request, this can lead to remote code execution. This vulnerability is application dependant. • https://www.exploit-db.com/exploits/49068 https://github.com/PrinceFPF/CVE-2019-0230 https://github.com/BH2UOL/CVE-2019-0230 https://github.com/ramoncjs3/CVE-2019-0230 https://github.com/Al1ex/CVE-2019-0230 https://github.com/fengziHK/CVE-2019-0230 https://github.com/f8al/CVE-2019-0230-PoC http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html http • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 9.3EPSS: 97%CPEs: 13EXPL: 13

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace. Apache Struts, desde la versión 2.3 hasta la 2.3.34 y desde la versión 2.5 hasta la 2.5.16, sufre de una posible ejecución remota de código cuando el valor de alwaysSelectFullNamespace es "true" (establecido por el usuario o por un plugin como Convention Plugin). Además, los resultados se emplean sin ningún espacio de nombres y, al mismo tiempo, el paquete superior no tiene espacio de nombres o contiene caracteres comodín. De manera similar a como pasa con los resultados, existe la misma posibilidad al emplear la etiqueta url, que no tiene un valor y acción definidos y, además, su paquete superior no tiene espacio de nombres o contiene caracteres comodín. Apache Struts contains a vulnerability that allows for remote code execution under two circumstances. • https://www.exploit-db.com/exploits/45260 https://www.exploit-db.com/exploits/45367 https://www.exploit-db.com/exploits/45262 https://github.com/hook-s3c/CVE-2018-11776-Python-PoC https://github.com/xfox64x/CVE-2018-11776 https://github.com/bhdresh/CVE-2018-11776 https://github.com/jiguangsdf/CVE-2018-11776 https://github.com/brianwrf/S2-057-CVE-2018-11776 https://github.com/knqyf263/CVE-2018-11776 https://github.com/cucadili/CVE-2018-11776 https://github.co •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. El plugin REST en Apache Struts emplea una biblioteca XStream vulnerable y que permite llevar a cabo un ataque de denegación de servicio (DoS) cuando utiliza una petición maliciosa con una carga útil XML especialmente manipulada. Se recomienda actualizar a la versión 2.5.16 de Apache Struts y cambiar a un controlador de XML Jackson opcional como se explica en el siguiente enlace: http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. • http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/103516 http://www.securitytracker.com/id/1040575 https://cwiki.apache.org/confluence/display/WW/S2-056 https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3%40%3Cissues.struts.apache.org%3E https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db%40%3Cissues.struts.apache.org%3E https://security.netapp.com/advisory/ntap-20180330-0001 •