Описание
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
Ссылки
- Vendor Advisory
- VDB EntryVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue Tracking
- Vendor Advisory
- Vendor Advisory
- VDB EntryVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Issue Tracking
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.22062
Средний
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 7.5
ubuntu
больше 9 лет назад
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
redhat
больше 9 лет назад
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
CVSS3: 7.5
debian
больше 9 лет назад
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to byp ...
fstec
больше 9 лет назад
Уязвимость программной платформы Apache Struts, позволяющая нарушителю обойти существующие ограничения доступа
EPSS
Процентиль: 96%
0.22062
Средний
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20