Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j77q-2qqg-6989

Опубликовано: 18 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

Apache Struts vulnerable to remote arbitrary command execution due to improper input validation

Apache Struts versions prior to 2.3.32 and 2.5.10.1 contain incorrect exception handling and error-message generation during file-upload attempts using the Jakarta Multipart parser, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

Ссылки

Пакеты

Наименование

org.apache.struts:struts2-core

maven
Затронутые версииВерсия исправления

>= 2.3.0, <= 2.3.31

2.3.32

Наименование

org.apache.struts:struts2-core

maven
Затронутые версииВерсия исправления

>= 2.5.0, <= 2.5.10

2.5.10.1

EPSS

Процентиль: 100%
0.94267
Критический

10 Critical

CVSS3

Дефекты

CWE-20
CWE-755

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

CVSS3: 9.8
redhat
почти 9 лет назад

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

CVSS3: 9.8
nvd
почти 9 лет назад

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

CVSS3: 9.8
debian
почти 9 лет назад

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 an ...

fstec
почти 9 лет назад

Уязвимость парсера Jakarta Multipart программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94267
Критический

10 Critical

CVSS3

Дефекты

CWE-20
CWE-755