Vulnerability Name: | CVE-2014-0113 (CCN-92742) |
Assigned: | 2013-12-03 |
Published: | 2014-04-25 |
Updated: | 2019-08-12 |
Summary: | CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. Note: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-264
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2014-0113
Source: CCN Type: JVNDB-2014-000045 Apache Struts vulnerable to ClassLoader manipulation
Source: CCN Type: SA58016 Apache Struts Two Vulnerabilities
Source: SECUNIA Type: Permissions Required 59178
Source: CCN Type: S2-021 Improves excluded params in ParametersInterceptor and CookieInterceptor to avoid ClassLoader manipulation
Source: CONFIRM Type: Third Party Advisory http://www-01.ibm.com/support/docview.wss?uid=swg21676706
Source: CCN Type: IBM Security Bulletin 1020893 IBM Platform Symphony (CVE-2014-0094, CVE-2014-0112, CVE-2014-0113, CVE-2014-0116)
Source: CCN Type: IBM Security Bulletin 1020894 IBM Platform Cluster Manager (CVE-2014-0094, CVE-2014-0112, CVE-2014-0113, CVE-2014-0116)
Source: CCN Type: IBM Security Bulletin 1020895 IBM Platform HPC (CVE-2014-0094, CVE-2014-0112, CVE-2014-0113, CVE-2014-0116)
Source: CCN Type: IBM Security Bulletin 1020896 IBM Platform Application Center (CVE-2014-0094, CVE-2014-0112, CVE-2014-0113, CVE-2014-0116)
Source: CCN Type: IBM Security Bulletin 1676706 IBM Sterling Order Management, IBM Sterling Configure, Price, Quote and Sterling Web Channel are affected by Apache Struts 2 security vulnerabilities
Source: CCN Type: IBM Security Bulletin 1680848 IBM Connections Security Refresh (CVE-2014-0114, CVE-2014-0113, CVE-2014-0112, CVE-2014-0094, CVE-2014-0116 )
Source: CONFIRM Type: Third Party Advisory http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20140426 [ANN] Struts 2.3.16.2 GA release available - security fix
Source: CCN Type: BID-67081 Apache Struts 'getClass()' Method Security Bypass Vulnerability
Source: CONFIRM Type: Patch, Vendor Advisory https://cwiki.apache.org/confluence/display/WW/S2-021
Source: XF Type: UNKNOWN apache-struts-cve20140113-code-exec(92742)
Source: CCN Type: IBM Security Bulletin 6620351 (Call Center for Commerce) IBM Call Center and Apache Struts Struts upgrade strategy (various CVEs, see below)
Source: CCN Type: IBM Security Bulletin 6620355 (Sterling Order Management) IBM Sterling Order Management Apache Struts upgrade strategy (various CVEs, see below)
Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-0113
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:struts:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 2.3.16.2) Configuration CCN 1: cpe:/a:apache:struts:2.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.3.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.7:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.4.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*AND cpe:/a:ibm:connections:4.5:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:3.0.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:4.0:*:*:*:*:*:*:*OR cpe:/a:ibm:platform_symphony:5.2:*:*:*:*:*:*:*OR cpe:/a:ibm:platform_symphony:6.1.1:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:5.0:*:*:*:*:*:*:* Denotes that component is vulnerable |
Oval Definitions |
|
BACK |