Apache Struts 2.3.20 Incorrect Default Exclude Pattern

Medium Nessus Plugin ID 83487


The remote web server hosts a web application that uses a Java framework that contains incorrect default exclude patterns.


The remote web server is using Apache Struts version 2.3.20. It is, therefore, affected by an issue where the default exclude patterns are incorrect when using default settings. This allows a remote attacker to impact the internal application's state.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Apache Struts version or later.

See Also


Plugin Details

Severity: Medium

ID: 83487

File Name: struts_2_3_20_1_win_local.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Family: Windows

Published: 2015/05/15

Modified: 2017/01/30

Dependencies: 73943

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Required KB Items: installed_sw/Apache Struts, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/05/06

Vulnerability Publication Date: 2015/05/06

Reference Information

CVE: CVE-2015-1831

OSVDB: 121713