VID |
27107 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
CookieInterceptor in Apache Struts before 2.3.16.2, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://cwiki.apache.org/confluence/display/WW/S2-021
* Platforms Affected: Apache Struts prior to 2.3.16.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Struts (2.3.16.2 or later), available from the Apache Struts Web page at https://struts.apache.org/download.cgi |
Related URL |
CVE-2014-0113 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|