Apache Struts 2.3.x Showcase App Struts 1 Plugin ActionMessage Class Error Message Input Handling RCE

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a web application that uses a Java
framework that is affected by a potential remote code execution
vulnerability.

Description :

The version of Apache Struts running on the remote Windows host is
2.3.x. It is, therefore, potentially affected by a remote code
execution vulnerability in the Struts 1 plugin showcase app in the
ActionMessage class due to improper validation of user-supplied input
passed via error messages. An unauthenticated, remote attacker can
exploit this to execute arbitrary code.

Note that Nessus has not tested for this issue but has instead
relied only on the application's self-reported version number.

See also :

https://struts.apache.org/docs/s2-048.html

Solution :

Refer to the vendor advisory for recommendations on passing data
to the 'ActionMessage' class.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.0
(CVSS2#E:POC/RL:U/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 101361 ()

Bugtraq ID: 99484

CVE ID: CVE-2017-9791

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now