Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0113

Опубликовано: 29 апр. 2014
Источник: debian
EPSS Высокий

Описание

CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javanot-affectedpackage

Примечания

  • https://struts.apache.org/release/2.3.x/docs/s2-021.html

EPSS

Процентиль: 99%
0.88063
Высокий

Связанные уязвимости

ubuntu
больше 11 лет назад

CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.

redhat
больше 11 лет назад

CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.

nvd
больше 11 лет назад

CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.

github
больше 3 лет назад

ClassLoader manipulation in Apache Struts

CVSS3: 7.1
fstec
больше 11 лет назад

Уязвимость реализации метода getClass класса CookieInterceptor программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.88063
Высокий