Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0114

Опубликовано: 29 апр. 2014
Источник: redhat
CVSS2: 7.5

Описание

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Отчет

This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. The impact of this depends on which ClassLoader properties are exposed. Exploits that lead to remote code execution have been published. These exploits rely on ClassLoader properties that are exposed on Tomcat 8, which is not included in any supported Red Hat products. However, some Red Hat products that ship Struts 1 do expose ClassLoader properties that could potentially be exploited. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/869353

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat AMQ Broker 7beanutilsAffected
Red Hat JBoss Enterprise Web Server 1strutsWill not fix
Red Hat JBoss Operations Network 3strutsAffected
Fuse ESB Enterprise 7.1.0FixedRHSA-2014:049814.05.2014
Red Hat AMQ Broker 7FixedRHSA-2019:299510.10.2019
Red Hat Enterprise Linux 5strutsFixedRHSA-2014:047407.05.2014
Red Hat JBoss Fuse 6.1FixedRHSA-2014:049714.05.2014
Red Hat JBoss Fuse 7FixedRHSA-2018:266911.09.2018
Red Hat JBoss Operations Network 3.2FixedRHSA-2014:051115.05.2014
Red Hat Network Satellite Server v 5.4strutsFixedRHSA-2014:050014.05.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-470
https://bugzilla.redhat.com/show_bug.cgi?id=10919381: Class Loader manipulation via request parameters

7.5 High

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

nvd
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

debian
почти 12 лет назад

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8. ...

github
почти 6 лет назад

Arbitrary code execution in Apache Commons BeanUtils

oracle-oval
почти 12 лет назад

ELSA-2014-0474: struts security update (IMPORTANT)

7.5 High

CVSS2