![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.802425 |
Category: | Web application abuses |
Title: | Apache Struts Security Update (S2-007) - Active Check |
Summary: | Apache Struts is prone to a java method execution; vulnerability. |
Description: | Summary: Apache Struts is prone to a java method execution vulnerability. Vulnerability Insight: The flaw is due to an improper conversion in OGNL expression if a non string property is contained in action. Vulnerability Impact: Successful exploitation could allow an attacker to execute arbitrary java method. Further that results to disclose environment variables or cause a denial of service or an arbitrary OS command can be executed. Affected Software/OS: Apache Struts (Showcase) 2.x through 2.2.3. Solution: Update to version 2.2.3.1 or later. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0838 JVN#79099262 http://jvn.jp/en/jp/JVN79099262/index.html JVNDB-2012-000012 http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012 http://struts.apache.org/2.3.1.2/docs/s2-007.html https://issues.apache.org/jira/browse/WW-3668 |
Copyright | Copyright (C) 2012 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |