CVE-2018-1327

CWE-916 documents6 sources
Severity
7.5HIGH
EPSS
6.2%
top 9.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateOct 16

Description

The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDapache/struts2.1.12.5.14.1
CVEListV5apache_software_foundation/apache_strutsApache Struts 2.1.1 to 2.5.14.1

Patches

🔴Vulnerability Details

3
GHSA
Apache Struts REST Plugin can potentially allow a DoS attack2018-10-16
OSV
Apache Struts REST Plugin can potentially allow a DoS attack2018-10-16
CVEList
CVE-2018-1327: The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with speciall2018-03-27

📋Vendor Advisories

1
Red Hat
struts: Denial-of-Service attack via crafted XML request using Struts REST plugin2018-03-27

💬Community

1
Bugzilla
CVE-2018-1327 struts: Denial-of-Service attack via crafted XML request using Struts REST plugin2018-03-27
CVE-2018-1327 (HIGH CVSS 7.5) | The Apache Struts REST Plugin is us | cvebase.io