Apache Struts CVE-2018-11776 Results With No Namespace Possible Remote Code Execution (S2-057)

high Nessus Plugin ID 112036
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

A web application running on the remote host uses a Java framework that is affected by a possible remote code execution.

Description

The version of Apache Struts running on the remote host is 2.3.x prior to 2.3.35, or 2.5.x prior to 2.5.17. It, therefore, contains a possible remote code execution vulnerability when results are used without setting a namespace along with an upper action that does not have a namespace set or has a wildcard namespace set.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Struts version 2.3.35 or 2.5.17 or later

See Also

https://cwiki.apache.org/confluence/display/WW/S2-057

https://seclists.org/bugtraq/2018/Aug/46

https://semmle.com/news/apache-struts-CVE-2018-11776

https://lgtm.com/blog/apache_struts_CVE-2018-11776

Plugin Details

Severity: High

ID: 112036

File Name: struts_2_5_17.nasl

Version: 1.15

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 8/22/2018

Updated: 11/30/2021

Dependencies: os_fingerprint.nasl, struts_detect_win.nbin, struts_detect_nix.nbin, struts_config_browser_detect.nbin

Risk Information

CVSS Score Source: CVE-2018-11776

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/22/2018

Vulnerability Publication Date: 8/22/2018

Exploitable With

Metasploit (Apache Struts 2 Namespace Redirect OGNL Injection)

Elliot (Apache Struts 2 Multiple Tags Result Namespace Handling RCE)

Reference Information

CVE: CVE-2018-11776

BID: 105125