Описание
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
| lucid | not-affected | |
| precise | not-affected | |
| trusty | not-affected | |
| trusty/esm | DNE | trusty was not-affected |
| upstream | needs-triage | |
| utopic | not-affected |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:to ...
Уязвимость программной платформы Apache Struts, связанная с использованием предсказуемых значений <s:token/>, позволяющая удаленному нарушителю осуществить CSRF-атаку
6.8 Medium
CVSS2