CVE-2012-1006 – Apache Struts - Multiple Persistent Cross-Site Scripting Vulnerabilities
https://notcve.org/view.php?id=CVE-2012-1006
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders. Múltiples vulnerabilidades de ejecución de comandos en sitos cruzados (XSS) en Apache Struts v2.0.14 y v2.2.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de los parámetros (1) Name o (2) LastName en struts2-showcase/person/ editPerson.action, o (3) el parámetro ClientName a struts2-rest-showcase/orders. • https://www.exploit-db.com/exploits/18452 http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt http://secpod.org/blog/?p=450 http://www.securityfocus.com/bid/51902 https://exchange.xforce.ibmcloud.com/vulnerabilities/72888 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2011-5057 – Apache Struts 2.0.9/2.1.8 - Session Tampering Security Bypass
https://notcve.org/view.php?id=CVE-2011-5057
Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor." Apache Struts versión 2.3.1.2 y anteriores, versiones 2.3.19 hasta 2.3.23, proporciona interfaces que no restringen apropiadamente el acceso a colecciones tales como las colecciones de sesiones y peticiones, lo que podría permitir a atacantes remotos modificar los valores de datos de tiempo de ejecución por medio de un parámetro diseñado para una aplicación que implementa una interfaz afectada, como es demostrado por las interfaces de SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware y ParameterAware. NOTA: el proveedor cuestiona la importancia de este reporte debido a una "easy work-around in existing apps by configuring the interceptor". • https://www.exploit-db.com/exploits/36426 http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html http://secunia.com/advisories/47109 https://issues.apache.org/jira/browse/WW-2264 https://issues.apache.org/jira/browse/WW-3631 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-0392 – Apache Struts 2 < 2.3.1 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2012-0392
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. El componente CookieInterceptor en Apache Struts antes de v2.3.1.1 no utiliza una lista blanca de nombres de parámetros, lo que permite a atacantes remotos ejecutar código de su elección a través de una cabecera de una Cookie HTTP debidamente modificada que desencadena la ejecución de código Java a través de un método estático. • https://www.exploit-db.com/exploits/18329 http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html http://secunia.com/advisories/47393 http://struts.apache.org/2.x/docs/s2-008.html http://struts.apache.org/2.x/docs/version-notes-2311.html http://www.exploit-db.com/exploits/18329 https://lists.immunityinc.com/pipermail/dailydave/2012-January/000011.html https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt •
CVE-2012-0391 – Apache Struts 2 Improper Input Validation Vulnerability
https://notcve.org/view.php?id=CVE-2012-0391
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. El componente ExceptionDelegator en Apache Struts antes de v2.2.3.1 interpreta los valores de los parámetros como expresiones OGNL durante el manejo de determinadas excepciones en tipos de datos de propiedades no coincidentes, lo que permite a atacantes remotos ejecutar código Java a través de un parámetro especificamente modificado para tal fin. The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution. • https://www.exploit-db.com/exploits/18984 https://www.exploit-db.com/exploits/18329 http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html http://secunia.com/advisories/47393 http://struts.apache.org/2.x/docs/s2-008.html http://struts.apache.org/2.x/docs/version-notes-2311.html http://www.exploit-db.com/exploits/18329 https://issues.apache.org/jira/browse/WW-3668 https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt • CWE-20: Improper Input Validation •
CVE-2012-0394 – Apache Struts - Developer Mode OGNL Execution
https://notcve.org/view.php?id=CVE-2012-0394
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself. ** CUESTIONADA ** El componente DebuggingInterceptor en Apache Struts antes de la versión v2.3.1.1, cuando se usa el modo desarrollador (developer), permite ejecutar comandos de su elección a atacantes remotos a través de vectores no especificados. NOTA: el vendedor indica que este comportamiento "no es una vulnerabilidad de seguridad en si misma". • https://www.exploit-db.com/exploits/31434 https://www.exploit-db.com/exploits/18329 http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html http://struts.apache.org/2.x/docs/s2-008.html http://struts.apache.org/2.x/docs/version-notes-2311.html http://www.exploit-db.com/exploits/18329 http://www.exploit-db.com/exploits/31434 http://www.osvdb.org/78276 https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt • CWE-94: Improper Control of Generation of Code ('Code Injection') •