![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.108771 |
Category: | Huawei |
Title: | Huawei Data Communication: Apache Struts2 RCE Vulnerability in Huawei Products (huawei-sa-20170316-01-struts2) |
Summary: | Apache Struts2 released a remote code execution (RCE); vulnerability in S2-045 on the official website.;; This VT has been deprecated and is therefore no longer functional. |
Description: | Summary: Apache Struts2 released a remote code execution (RCE) vulnerability in S2-045 on the official website. This VT has been deprecated and is therefore no longer functional. Vulnerability Insight: Apache Struts2 released a remote code execution vulnerability in S2-045 on the official website. An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. (Vulnerability ID: HWPSIRT-2017-03094)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-5638.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references. Vulnerability Impact: An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. Affected Software/OS: AAA versions V300R003C30 V500R005C00 V500R005C10 V500R005C11 V500R005C12 AnyOffice versions 2.5.0302.0201T 2.5.0501.0290 iManager NetEco 6000 versions V600R007C91 Solution: See the referenced vendor advisory for a solution. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5638 BugTraq ID: 96729 http://www.securityfocus.com/bid/96729 CERT/CC vulnerability note: VU#834067 https://www.kb.cert.org/vuls/id/834067 https://exploit-db.com/exploits/41570 https://www.exploit-db.com/exploits/41614/ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/ https://github.com/mazen160/struts-pwn https://github.com/rapid7/metasploit-framework/issues/8064 https://isc.sans.edu/diary/22169 https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt https://twitter.com/theog150/status/841146956135124993 https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/ https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E http://www.securitytracker.com/id/1037973 |
Copyright | Copyright (C) 2020 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |