CVE-2017-9791

The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*

History

21 Nov 2024, 03:36

Type Values Removed Values Added
References () http://struts.apache.org/docs/s2-048.html - Mitigation, Vendor Advisory () http://struts.apache.org/docs/s2-048.html - Mitigation, Vendor Advisory
References () http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/99484 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99484 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038838 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038838 - Third Party Advisory, VDB Entry
References () https://security.netapp.com/advisory/ntap-20180706-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180706-0002/ - Third Party Advisory
References () https://www.exploit-db.com/exploits/42324/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42324/ - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/44643/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44643/ - Third Party Advisory, VDB Entry

Information

Published : 2017-07-10 16:29

Updated : 2025-04-03 15:52


NVD link : CVE-2017-9791

Mitre link : CVE-2017-9791

CVE.ORG link : CVE-2017-9791


JSON object : View

Products Affected

apache

  • struts
CWE
CWE-20

Improper Input Validation