Apache Struts 2 Multiple Vulnerabilities

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a web application that uses a Java
framework that is affected by multiple vulnerabilities.

Description :

The remote web server is using a version of Struts 2 that is affected
by multiple vulnerabilities :

- A cross-site request forgery vulnerability exists due to
the token generator failing to adequately randomize the
token values. An attacker can exploit this issue by
extracting a token from a form and then predicting the
next token value that will be used to secure form
submissions. By convincing a victim to visit a specially
crafted form, the predicted token value can be used to
force an action for a logged in user. Note that this
vulnerability can only be exploited when the <s:token/>
tag is used within a form. (CVE-2014-7809)

- A cross-site scripting vulnerability exists due to
improper validation of input passed via the 'Problem
Report' screen when using debug mode. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to execute arbitrary script
code in the context of a user's browser session.
(CVE-2015-5169)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

http://struts.apache.org/docs/s2-023.html
https://issues.apache.org/jira/browse/WW-4423

Solution :

Upgrade to Apache Struts version 2.3.20 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 79860 ()

Bugtraq ID: 71548
76625

CVE ID: CVE-2014-7809
CVE-2015-5169

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now