Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2012-1592

Severity
8.8HIGH
EPSS
0.6%
top 30.87%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 5
Latest updateApr 23

Description

A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

3
OSV
Unrestricted Upload of File with Dangerous Type in Apache Struts22022-04-23
GHSA
Unrestricted Upload of File with Dangerous Type in Apache Struts22022-04-23
CVEList
CVE-2012-1592: A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitr2019-12-05

💥Exploits & PoCs

2
Exploit-DB
SAP NetWeaver Message Server - Multiple Vulnerabilities2013-02-17
Exploit-DB
Apache Struts 2.0 - 'XSLTResult.java' Arbitrary File Upload2012-03-23

💬Community

2
Bugzilla
CVE-2012-4549 JBoss AS: EJB authorization succeeds for any role when allowed roles list is empty2012-10-29
Bugzilla
CVE-2012-1592 struts2: xsltResult local code execution flaw2012-03-27