Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p66x-2cv9-qq3v

Опубликовано: 10 июн. 2020
Источник: github
Github: Прошло ревью

Описание

Arbitrary code execution in Apache Commons BeanUtils

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Ссылки

Пакеты

Наименование

commons-beanutils:commons-beanutils

maven
Затронутые версииВерсия исправления

>= 1.8.0, < 1.9.4

1.9.4

EPSS

Процентиль: 100%
0.92739
Критический

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

redhat
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

nvd
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

debian
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8. ...

oracle-oval
почти 12 лет назад

ELSA-2014-0474: struts security update (IMPORTANT)

EPSS

Процентиль: 100%
0.92739
Критический

Дефекты

CWE-20