Apache Struts 2 ClassLoader Manipulation Incomplete Fix for Security Bypass

high Nessus Plugin ID 73763


The remote web server contains a web application that uses a Java framework that is affected by a security bypass vulnerability.


The remote web application appears to use Struts 2, a web framework that utilizes OGNL (Object-Graph Navigation Language) as an expression language. The version of Struts 2 in use is affected by a security bypass vulnerability, possibly due to an incomplete fix for ClassLoader manipulation implemented in version

Note that this plugin will only report the first vulnerable instance of a Struts 2 application.


Upgrade to version or later.

See Also



Plugin Details

Severity: High

ID: 73763

File Name: struts_2_3_16_2_dos.nasl

Version: 1.15

Type: remote

Published: 4/29/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-0113

Vulnerability Information

CPE: cpe:/a:apache:struts

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/24/2014

Vulnerability Publication Date: 4/24/2014

Exploitable With

Metasploit (Apache Struts ClassLoader Manipulation Remote Code Execution)

Reference Information

CVE: CVE-2014-0112, CVE-2014-0113

BID: 67064, 67081

CERT: 719225