![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.108771 |
Kategorie: | Huawei |
Titel: | Huawei Data Communication: Apache Struts2 RCE Vulnerability in Huawei Products (huawei-sa-20170316-01-struts2) |
Zusammenfassung: | Apache Struts2 released a remote code execution (RCE); vulnerability in S2-045 on the official website.;; This VT has been deprecated and is therefore no longer functional. |
Beschreibung: | Summary: Apache Struts2 released a remote code execution (RCE) vulnerability in S2-045 on the official website. This VT has been deprecated and is therefore no longer functional. Vulnerability Insight: Apache Struts2 released a remote code execution vulnerability in S2-045 on the official website. An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. (Vulnerability ID: HWPSIRT-2017-03094)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-5638.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references. Vulnerability Impact: An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. Affected Software/OS: AAA versions V300R003C30 V500R005C00 V500R005C10 V500R005C11 V500R005C12 AnyOffice versions 2.5.0302.0201T 2.5.0501.0290 iManager NetEco 6000 versions V600R007C91 Solution: See the referenced vendor advisory for a solution. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5638 BugTraq ID: 96729 http://www.securityfocus.com/bid/96729 CERT/CC vulnerability note: VU#834067 https://www.kb.cert.org/vuls/id/834067 https://exploit-db.com/exploits/41570 https://www.exploit-db.com/exploits/41614/ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/ https://github.com/mazen160/struts-pwn https://github.com/rapid7/metasploit-framework/issues/8064 https://isc.sans.edu/diary/22169 https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt https://twitter.com/theog150/status/841146956135124993 https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/ https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E http://www.securitytracker.com/id/1037973 |
Copyright | Copyright (C) 2020 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |