Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.108771
Kategorie:Huawei
Titel:Huawei Data Communication: Apache Struts2 RCE Vulnerability in Huawei Products (huawei-sa-20170316-01-struts2)
Zusammenfassung:Apache Struts2 released a remote code execution (RCE); vulnerability in S2-045 on the official website.;; This VT has been deprecated and is therefore no longer functional.
Beschreibung:Summary:
Apache Struts2 released a remote code execution (RCE)
vulnerability in S2-045 on the official website.

This VT has been deprecated and is therefore no longer functional.

Vulnerability Insight:
Apache Struts2 released a remote code execution vulnerability in S2-045 on the official website. An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. (Vulnerability ID: HWPSIRT-2017-03094)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-5638.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references.

Vulnerability Impact:
An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value.

Affected Software/OS:
AAA versions V300R003C30 V500R005C00 V500R005C10 V500R005C11 V500R005C12

AnyOffice versions 2.5.0302.0201T 2.5.0501.0290

iManager NetEco 6000 versions V600R007C91

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-5638
BugTraq ID: 96729
http://www.securityfocus.com/bid/96729
CERT/CC vulnerability note: VU#834067
https://www.kb.cert.org/vuls/id/834067
https://exploit-db.com/exploits/41570
https://www.exploit-db.com/exploits/41614/
http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html
http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/
http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html
https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/
https://github.com/mazen160/struts-pwn
https://github.com/rapid7/metasploit-framework/issues/8064
https://isc.sans.edu/diary/22169
https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html
https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt
https://twitter.com/theog150/status/841146956135124993
https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
http://www.securitytracker.com/id/1037973
CopyrightCopyright (C) 2020 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.