Описание
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
Ссылки
- PatchThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Vendor Advisory
- Issue TrackingThird Party AdvisoryVDB Entry
- MitigationVendor Advisory
- Broken Link
- Third Party Advisory
- MitigationVendor Advisory
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- Third Party AdvisoryUS Government Resource
- PatchThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Vendor Advisory
- Issue TrackingThird Party AdvisoryVDB Entry
- MitigationVendor Advisory
- Broken Link
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
Связанные уязвимости
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and ...
REST Plugin in Apache Struts uses an XStreamHandler with an instance of XStream for deserialization without any type filtering
Уязвимость плагина REST программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код
EPSS
8.1 High
CVSS3
6.8 Medium
CVSS2