Apache Struts 2 REST Plugin XStream XML Request Deserialization RCE

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a web application that uses a Java
framework that is affected by a remote code execution vulnerability.

Description :

The remote web application appears to use the Apache Struts 2 web
framework. A remote code execution vulnerability exists in the REST
plugin, which uses XStreamHandler to insecurely deserialize
user-supplied input in XML requests. An unauthenticated, remote
attacker can exploit this, via a specially crafted XML request, to
execute arbitrary code.

Note that this plugin only reports the first vulnerable instance of a
Struts 2 application.

See also :

https://cwiki.apache.org/confluence/display/WW/S2-052
https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.3.34
https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.13
https://lgtm.com/blog/apache_struts_CVE-2017-9805_announcement
https://lgtm.com/blog/apache_struts_CVE-2017-9805
https://github.com/jas502n/St2-052

Solution :

Upgrade to Apache Struts version 2.3.34 or 2.5.13 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 102977 ()

Bugtraq ID:

CVE ID: CVE-2017-9805

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now