Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0114

Опубликовано: 30 апр. 2014
Источник: debian
EPSS Критический

Описание

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javafixed1.2.9-9package
commons-beanutilsfixed1.9.2-1package
commons-beanutilsno-dsawheezypackage
commons-beanutilsno-dsasqueezepackage

Примечания

  • http://mail-archives.apache.org/mod_mbox/struts-announcements/201404.mbox/%3C535F5F52.4040108%40apache.org%3E

  • https://issues.apache.org/jira/browse/BEANUTILS-463

EPSS

Процентиль: 100%
0.92315
Критический

Связанные уязвимости

ubuntu
больше 11 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

redhat
больше 11 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

nvd
больше 11 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

github
около 5 лет назад

Arbitrary code execution in Apache Commons BeanUtils

oracle-oval
больше 11 лет назад

ELSA-2014-0474: struts security update (IMPORTANT)

EPSS

Процентиль: 100%
0.92315
Критический