Apache Struts 2.3.x Showcase App Struts 1 Plugin ActionMessage Class Error Message Input Handling RCE

Critical Nessus Plugin ID 101361


The remote Windows host contains a web application that uses a Java framework that is affected by a potential remote code execution vulnerability.


The version of Apache Struts running on the remote Windows host is 2.3.x. It is, therefore, potentially affected by a remote code execution vulnerability in the Struts 1 plugin showcase app in the ActionMessage class due to improper validation of user-supplied input passed via error messages. An unauthenticated, remote attacker can exploit this to execute arbitrary code.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Refer to the vendor advisory for recommendations on passing data to the 'ActionMessage' class.

See Also


Plugin Details

Severity: Critical

ID: 101361

File Name: struts_2_3_x_rce_win_local.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2017/07/11

Modified: 2017/11/22

Dependencies: 73943

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:C


Base Score: 9.8

Temporal Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Required KB Items: installed_sw/Apache Struts, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2017/07/07

Exploitable With

Core Impact

Elliot (Apache Struts 2 Struts 1 Plugin ActionMessage < 2.3.32 RCE)

Reference Information

CVE: CVE-2017-9791

BID: 99484

OSVDB: 160547