Apache Struts 2 s:a / s:url Tag href Element XSS

low Nessus Plugin ID 38208

Synopsis

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Description

The web application on the remote host is affected by a cross-site scripting vulnerability due to a vulnerable version of Apache Struts 2 that fails to properly encode the parameters in the 's:a' and 's:url' tags.

A remote attacker can exploit this by tricking a user into requesting a page with arbitrary script code injected. This could have consequences such as stolen authentication credentials.

Solution

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

See Also

https://issues.apache.org/jira/browse/WW-2414

https://issues.apache.org/jira/browse/WW-2427

http://struts.apache.org/docs/s2-002.html

Plugin Details

Severity: Low

ID: 38208

File Name: struts_sa_surl_xss.nasl

Version: 1.22

Type: remote

Published: 4/29/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2008-6682

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Exploit Ease: No exploit is required

Patch Publication Date: 2/25/2008

Vulnerability Publication Date: 1/11/2008

Reference Information

CVE: CVE-2008-6682

BID: 34686

CWE: 79

SECUNIA: 32497