⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..
CVE-2017-9805
CWE-502 — Deserialization of Untrusted DataCWE-20 — Improper Input ValidationCWE-39930 documents15 sources
Severity
8.1HIGH
EPSS
94.3%
top 0.05%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 15
KEV addedNov 3
KEV dueMay 3
CISA Required Action: Apply updates per vendor instructions.
Description
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages5 packages
▶CVEListV5apache_software_foundation/apache_strutsApache Struts before 2.3.34 and 2.5.x before 2.5.13
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
2Nuclei▶
Apache Struts2 S2-052 - Remote Code Execution