Описание
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [struts 2 only]] |
precise/esm | DNE | |
trusty | not-affected | struts 2 only |
trusty/esm | DNE | trusty was not-affected [struts 2 only] |
upstream | needs-triage | |
vivid/ubuntu-core | DNE | |
xenial | DNE | |
yakkety | DNE | |
zesty | DNE |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remot ...
Уязвимость плагина Struts 1 программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3