Apache Struts s:a / s:url Tag href Element XSS

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote host is running a web application that is affected by
multiple cross-site scripting vulnerabilities.

Description :

The web application on the remote host is vulnerable to cross-site
scripting attacks. This is likely due to a vulnerable version of
Apache Struts that fails to properly encode the parameters in the
's:a' and 's:url' tags.

A remote attacker could exploit this by tricking a user into
requesting a page with arbitrary script code injected. This could
have consequences such as stolen authentication credentials.

See also :

https://issues.apache.org/jira/browse/WW-2414
https://issues.apache.org/jira/browse/WW-2427
http://struts.apache.org/development/2.x/docs/s2-002.html

Solution :

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 38208 ()

Bugtraq ID: 34686

CVE ID: CVE-2008-6682