CVE-2017-9805
HIGH
8,1
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM
6,8
Source: [email protected]
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial
Description
AI Translation Available
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,9432
Percentile
1,0th
Updated
EPSS Score Trend (Last 90 Days)
502
Deserialization of Untrusted Data
DraftCommon Consequences
Security Scopes Affected:
Integrity
Availability
Other
Potential Impacts:
Modify Application Data
Unexpected State
Dos: Resource Consumption (Cpu)
Varies By Context
Applicable Platforms
Languages:
Java, JavaScript, PHP, Python, Ruby
Technologies:
AI/ML, ICS/OT, Not Technology-Specific
Exploit
Apache Struts 2.5 < 2.5.12 - REST Plugin …
Apache Struts 2.5 < 2.5.12 - REST Plugin XStream Remote Code Execution
View Exploit Code →
Application
Struts by Apache
Version Range Affected
From
2.1.2
(inclusive)
To
2.3.34
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Struts by Apache
Version Range Affected
From
2.5.0
(inclusive)
To
2.5.13
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Network Performance Analysis by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:network_performance_analysis:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Oncommand Balance by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Hosted Collaboration Solution by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:hosted_collaboration_solution:11.0\(1\):*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Media Experience Engine by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:media_experience_engine:3.5.2:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Video Distribution Suite For Internet Streaming by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:video_distribution_suite_for_internet_streaming:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Media Experience Engine by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:media_experience_engine:3.5:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Hosted Collaboration Solution by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\(1\):*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Hosted Collaboration Solution by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:hosted_collaboration_solution:11.6\(1\):*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Digital Media Manager by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Hosted Collaboration Solution by Cisco
CPE Identifier
View Detailed Analysis
cpe:2.3:a:cisco:hosted_collaboration_solution:11.5\(1\):*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017…
https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax
https://bugzilla.redhat.com/show_bug.cgi?id=1488482
https://cwiki.apache.org/confluence/display/WW/S2-052
https://lgtm.com/blog/apache_struts_CVE-2017-9805
https://security.netapp.com/advisory/ntap-20170907-0001/
https://struts.apache.org/docs/s2-052.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
https://www.exploit-db.com/exploits/42627/
https://www.kb.cert.org/vuls/id/112992
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403…
http://www.securityfocus.com/bid/100609
http://www.securitytracker.com/id/1039263
https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax
https://bugzilla.redhat.com/show_bug.cgi?id=1488482
https://cwiki.apache.org/confluence/display/WW/S2-052
https://lgtm.com/blog/apache_struts_CVE-2017-9805
https://security.netapp.com/advisory/ntap-20170907-0001/
https://struts.apache.org/docs/s2-052.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
https://www.exploit-db.com/exploits/42627/
https://www.kb.cert.org/vuls/id/112992
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403…
http://www.securityfocus.com/bid/100609
http://www.securitytracker.com/id/1039263