Apache Software Foundation Apache Struts vulnerabilities
24 known vulnerabilities affecting apache_software_foundation/apache_struts.
Total CVEs
24
CISA KEV
5
actively exploited
Public exploits
7
Exploited in wild
7
Severity breakdown
CRITICAL8HIGH10MEDIUM6
Vulnerabilities
Page 2 of 2
CVE-2017-9787HIGHCVSS 7.5v2.3.x prior to 2.3.33v2.5 to 2.5.10.12017-07-13
CVE-2017-9787 [HIGH] CVE-2017-9787: When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attac
When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.
cvelistv5nvd
CVE-2017-7672MEDIUMCVSS 5.9v2.3.7 - 2.3.33v2.5 - 2.5.122017-07-13
CVE-2017-7672 [MEDIUM] CWE-20 CVE-2017-7672: If an application allows enter an URL in a form field and built-in URLValidator is used, it is possi
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12.
cvelistv5nvd
CVE-2017-9791CRITICALCVSS 9.8KEVPoCv2.1.x seriesv2.3.x series2017-07-10
CVE-2017-9791 [CRITICAL] CWE-20 CVE-2017-9791: The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicio
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
cvelistv5nvd
CVE-2017-5638CRITICALCVSS 9.8KEVPoCv2.3.x before 2.3.32v2.5.x before 2.5.10.12017-03-11
CVE-2017-5638 [CRITICAL] CWE-755 CVE-2017-5638: The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has in
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild i
cvelistv5nvd
← Previous2 / 2