Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0392

Опубликовано: 08 янв. 2012
Источник: debian
EPSS Критический

Описание

The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javanot-affectedpackage

EPSS

Процентиль: 100%
0.91467
Критический

Связанные уязвимости

ubuntu
около 14 лет назад

The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.

redhat
около 14 лет назад

The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.

nvd
около 14 лет назад

The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.

github
почти 4 года назад

Apache Struts's CookieInterceptor component does not use the parameter-name whitelist

CVSS3: 7.3
fstec
около 14 лет назад

Уязвимость реализации класса CookieInterceptor программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.91467
Критический