SynopsisThe remote web server hosts a web application that uses a Java framework that is affected by multiple vulnerabilities.
DescriptionThe remote web server is using a version of Struts 2 that is affected by multiple vulnerabilities :
- A cross-site request forgery vulnerability exists due to the token generator failing to adequately randomize the token values. An attacker can exploit this issue by extracting a token from a form and then predicting the next token value that will be used to secure form submissions. By convincing a victim to visit a specially crafted form, the predicted token value can be used to force an action for a logged in user. Note that this vulnerability can only be exploited when the <s:token/> tag is used within a form. (CVE-2014-7809)
- A cross-site scripting vulnerability exists due to improper validation of input passed via the 'Problem Report' screen when using debug mode. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in the context of a user's browser session.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionUpgrade to Apache Struts version 2.3.20 or later.