Apache Struts 2 Multiple Vulnerabilities (S2-023) (S2-025)

Medium Nessus Plugin ID 79860

Synopsis

The remote web server hosts a web application that uses a Java framework that is affected by multiple vulnerabilities.

Description

The remote web server is using a version of Struts 2 that is affected by multiple vulnerabilities :

- A cross-site request forgery vulnerability exists due to the token generator failing to adequately randomize the token values. An attacker can exploit this issue by extracting a token from a form and then predicting the next token value that will be used to secure form submissions. By convincing a victim to visit a specially crafted form, the predicted token value can be used to force an action for a logged in user. Note that this vulnerability can only be exploited when the <s:token/> tag is used within a form. (CVE-2014-7809)

- A cross-site scripting vulnerability exists due to improper validation of input passed via the 'Problem Report' screen when using debug mode. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in the context of a user's browser session.
(CVE-2015-5169)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Struts version 2.3.20 or later.

See Also

http://struts.apache.org/docs/s2-023.html

http://struts.apache.org/docs/s2-025.html

https://issues.apache.org/jira/browse/WW-4423

Plugin Details

Severity: Medium

ID: 79860

File Name: struts_2_3_20_win_local.nasl

Version: 1.15

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 2014/12/10

Updated: 2019/02/15

Dependencies: 11936, 73943, 99671, 122235

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2014-7809

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Required KB Items: Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/11/21

Vulnerability Publication Date: 2014/12/01

Reference Information

CVE: CVE-2014-7809, CVE-2015-5169

BID: 71548, 76625