Apache Struts 2.3.x Showcase App Struts 1 Plugin ActionMessage Class Error Message Input Handling RCE (S2-048)

High Nessus Plugin ID 101361


The remote Windows host contains a web application that uses a Java framework that is affected by a potential remote code execution vulnerability.


The version of Apache Struts running on the remote Windows host is 2.3.x. It is, therefore, potentially affected by a remote code execution vulnerability in the Struts 1 plugin showcase app in the ActionMessage class due to improper validation of user-supplied input passed via error messages. An unauthenticated, remote attacker can exploit this to execute arbitrary code.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Refer to the vendor advisory for recommendations on passing data to the 'ActionMessage' class.

See Also


Plugin Details

Severity: High

ID: 101361

File Name: struts_2_3_x_rce_win_local.nasl

Version: 1.10

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 2017/07/11

Updated: 2019/02/15

Dependencies: 11936, 73943, 99671, 122235

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2017-9791

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2017/07/07

Exploitable With

Core Impact

Metasploit (Apache Struts 2 Struts 1 Plugin Showcase OGNL Code Execution)

Elliot (Apache Struts 2 Struts 1 Plugin ActionMessage < 2.3.32 RCE)

Reference Information

CVE: CVE-2017-9791

BID: 99484