CVE-2018-11776

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.
References
Link Resource
http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt Mailing List Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch Third Party Advisory
http://www.securityfocus.com/bid/105125 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041547 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041888 Broken Link Third Party Advisory VDB Entry
https://cwiki.apache.org/confluence/display/WW/S2-057 Issue Tracking Third Party Advisory
https://github.com/hook-s3c/CVE-2018-11776-Python-PoC Exploit Third Party Advisory
https://lgtm.com/blog/apache_struts_CVE-2018-11776 Exploit Third Party Advisory
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012 Third Party Advisory
https://security.netapp.com/advisory/ntap-20180822-0001/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20181018-0002/ Third Party Advisory
https://www.exploit-db.com/exploits/45260/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45262/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45367/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*

History

25 Jul 2024, 14:48

Type Values Removed Values Added
CPE cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*
CWE CWE-20 NVD-CWE-noinfo
First Time Oracle
Oracle enterprise Manager Base Platform
Oracle mysql Enterprise Monitor
Oracle communications Policy Management
Netapp active Iq Unified Manager
Netapp
Netapp oncommand Insight
Netapp oncommand Workflow Automation
Netapp snapcenter
References () http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/105125 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105125 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041547 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041547 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041888 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041888 - Broken Link, Third Party Advisory, VDB Entry
References () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List
References () https://www.oracle.com/security-alerts/cpujul2020.html - () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory

12 Jun 2023, 07:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html -

Information

Published : 2018-08-22 13:29

Updated : 2024-07-25 14:48


NVD link : CVE-2018-11776

Mitre link : CVE-2018-11776

CVE.ORG link : CVE-2018-11776


JSON object : View

Products Affected

netapp

  • oncommand_insight
  • active_iq_unified_manager
  • snapcenter
  • oncommand_workflow_automation

oracle

  • communications_policy_management
  • mysql_enterprise_monitor
  • enterprise_manager_base_platform

apache

  • struts