Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9805

Опубликовано: 15 сент. 2017
Источник: debian
EPSS Критический

Описание

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javaremovedpackage
libstruts1.2-javanot-affectedwheezypackage

Примечания

  • https://struts.apache.org/docs/s2-052.html

EPSS

Процентиль: 100%
0.94322
Критический

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 8 лет назад

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

CVSS3: 8.1
redhat
больше 8 лет назад

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

CVSS3: 8.1
nvd
больше 8 лет назад

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

CVSS3: 8.1
github
больше 7 лет назад

REST Plugin in Apache Struts uses an XStreamHandler with an instance of XStream for deserialization without any type filtering

fstec
больше 8 лет назад

Уязвимость плагина REST программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94322
Критический