Apache Struts 2.x < Multiple Vulnerabilities

Critical Nessus Plugin ID 90773


The remote Windows host contains a web application that uses a Java framework that is affected by multiple vulnerabilities.


The version of Apache Struts running on the remote Windows host is 2.x prior to It is, therefore, affected by the following vulnerabilities :

- An unspecified flaw exists, related to chained expressions, when Dynamic Method Invocation (DMI) is enabled. An unauthenticated, remote attacker can exploit this, via a crafted expression, to execute arbitrary code. (CVE-2016-3081)

- A flaw exists in XSLTResult due to a failure to sanitize user-supplied input to the 'location' parameter when determining the location of an uploaded stylesheet.
An unauthenticated, remote attacker can exploit this, via a request to a crafted stylesheet, to execute arbitrary code. (CVE-2016-3082)

- A flaw exists that is triggered when dynamic method invocation is enabled while using the REST plugin. A remote attacker can exploit this, via a specially crafted expression, to execute arbitrary code.
(CVE-2016-3087) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to Apache Struts version or later. Alternatively, apply the workarounds referenced in the vendor advisories.

See Also





Plugin Details

Severity: Critical

ID: 90773

File Name: struts_2_3_28_1_win_local.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2016/04/28

Modified: 2018/03/01

Dependencies: 73943

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:apache:struts

Required KB Items: installed_sw/Apache Struts, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/04/21

Vulnerability Publication Date: 2016/04/21

Exploitable With


Core Impact

Metasploit (Apache Struts REST Plugin With Dynamic Method Invocation Remote Code Execution)

Reference Information

CVE: CVE-2016-3081, CVE-2016-3082, CVE-2016-3087

BID: 87327

OSVDB: 137435, 137436, 139234