Apache Struts 2.3.x Showcase App Struts 1 Plugin ActionMessage Class Error Message Input Handling RCE (S2-048)

High Nessus Plugin ID 101361

Synopsis

The remote Windows host contains a web application that uses a Java framework that is affected by a potential remote code execution vulnerability.

Description

The version of Apache Struts running on the remote Windows host is 2.3.x. It is, therefore, potentially affected by a remote code execution vulnerability in the Struts 1 plugin showcase app in the ActionMessage class due to improper validation of user-supplied input passed via error messages. An unauthenticated, remote attacker can exploit this to execute arbitrary code.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Refer to the vendor advisory for recommendations on passing data to the 'ActionMessage' class.

See Also

https://struts.apache.org/docs/s2-048.html

Plugin Details

Severity: High

ID: 101361

File Name: struts_2_3_x_rce_win_local.nasl

Version: 1.10

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 2017/07/11

Updated: 2019/02/15

Dependencies: 11936, 73943, 99671, 122235

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2017-9791

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2017/07/07

Exploitable With

Core Impact

Metasploit (Apache Struts 2 Struts 1 Plugin Showcase OGNL Code Execution)

Elliot (Apache Struts 2 Struts 1 Plugin ActionMessage < 2.3.32 RCE)

Reference Information

CVE: CVE-2017-9791

BID: 99484