Vulnerability Name:

CVE-2007-4556 (CCN-36428)

Assigned:2007-07-21
Published:2007-07-21
Updated:2018-10-26
Summary:Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-4556

Source: CONFIRM
Type: Patch, Vendor Advisory
http://forums.opensymphony.com/ann.jspa?annID=54

Source: CCN
Type: Apache Struts Web page - Key: WW-2030
User input is evaluated as an OGNL expression

Source: CONFIRM
Type: Third Party Advisory
http://issues.apache.org/struts/browse/WW-2030

Source: CONFIRM
Type: Vendor Advisory
http://jira.opensymphony.com/browse/XW-544

Source: CONFIRM
Type: Vendor Advisory
http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21701

Source: CONFIRM
Type: Vendor Advisory
http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21706

Source: OSVDB
Type: Broken Link
37072

Source: CCN
Type: SA26681
XWork Input Validation OGNL Command Injection Vulnerability

Source: SECUNIA
Type: Third Party Advisory
26681

Source: CCN
Type: SA26693
Apache Struts XWork Input Validation OGNL Command Injection Vulnerability

Source: SECUNIA
Type: Third Party Advisory
26693

Source: CCN
Type: SA26694
Opensymphony WebWork XWork Input Validation OGNL Command Injection

Source: SECUNIA
Type: Third Party Advisory
26694

Source: CONFIRM
Type: Patch, Third Party Advisory
http://struts.apache.org/2.x/docs/s2-001.html

Source: CCN
Type: Opensymphony WebWork XWork Web page
Xwork 1.2.3 Press Release - critical security issue allowing users to execute arbituary any OGNL expression

Source: CONFIRM
Type: Vendor Advisory
http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release

Source: CCN
Type: OSVDB ID: 37072
OpenSymphony XWork Struts OGNL Arbitrary Command Execution

Source: BID
Type: Third Party Advisory, VDB Entry
25524

Source: CCN
Type: BID-25524
XWork AltSyntax OGNL Input Validation Vulnerability

Source: VUPEN
Type: Third Party Advisory
ADV-2007-3041

Source: VUPEN
Type: Third Party Advisory
ADV-2007-3042

Source: XF
Type: UNKNOWN
opensymphony-ognl-code-execution(36428)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:opensymphony:xwork:*:*:*:*:*:*:*:* (Version < 1.2.3)
  • OR cpe:/a:opensymphony:xwork:*:*:*:*:*:*:*:* (Version >= 2.0.0 and <= 2.0.4)

  • Configuration CCN 1:
  • cpe:/a:apache:struts:2.0.8:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    opensymphony xwork *
    opensymphony xwork *
    apache struts 2.0.8