| VID |
27098 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Struts 1 plugin in Apache Struts 2.3.x < 2.3.33 might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://struts.apache.org/docs/s2-048.html
* Platforms Affected: Apache Struts 2.3.x prior to 2.3.33 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Apache Struts (2.3.33 or later), available from the Apache Struts Web page at http://struts.apache.org/docs/s2-048.html |
| Related URL |
CVE-2017-9791 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|