CVE-2012-4386

medium

Description

The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.

References

https://issues.apache.org/jira/browse/WW-3858

https://exchange.xforce.ibmcloud.com/vulnerabilities/78182

http://www.securityfocus.com/bid/55346

http://www.openwall.com/lists/oss-security/2012/09/01/5

http://www.openwall.com/lists/oss-security/2012/09/01/4

http://struts.apache.org/2.x/docs/s2-010.html

http://secunia.com/advisories/50420

Details

Source: Mitre, NVD

Published: 2012-09-05

Updated: 2017-08-29

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Severity: Medium