Apache Struts ClassLoader Manipulation

high Nessus Plugin ID 73919
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote web server contains a web application that uses a Java framework that is affected by a ClassLoader manipulation vulnerability.


The remote web application appears to use Struts, a web application framework. The version of Struts in use contains a flaw that allows the manipulation of the ClassLoader via the 'class' parameter of an ActionForm object that results a denial of service.

Note that this vulnerability may be exploited to execute arbitrary remote code in certain application servers with specific configurations; however, Nessus has not tested for this issue.

Additionally, note that this plugin will only report the first vulnerable instance of a Struts application.


Unknown at this time. Note that Struts 1 has reached end-of-life and is no longer supported.

See Also






Plugin Details

Severity: High

ID: 73919

File Name: struts_classloader_manipulation.nasl

Version: 1.11

Type: remote

Published: 5/8/2014

Updated: 11/15/2018

Dependencies: http_version.nasl, webmirror.nasl

Risk Information


Risk Factor: Critical

Score: 9.3


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 4/29/2014

Exploitable With

Metasploit (Apache Struts ClassLoader Manipulation Remote Code Execution)

Reference Information

CVE: CVE-2014-0114

BID: 67121