How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote web server contains a web application that uses a Java
framework that is affected by a security bypass vulnerability.
The remote web application appears to use Struts 2, a web framework
that utilizes OGNL (Object-Graph Navigation Language) as an expression
language. The version of Struts 2 in use is affected by a security
bypass vulnerability, possibly due to an incomplete fix for
ClassLoader manipulation implemented in version 22.214.171.124.
Note that this plugin will only report the first vulnerable instance
of a Struts 2 application.
See also :
Upgrade to version 126.96.36.199 or later.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Family: Denial of Service
Nessus Plugin ID: 73763 ()
Bugtraq ID: 6706467081
CVE ID: CVE-2014-0112CVE-2014-0113
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.