Vulnerability Name:
CVE-2014-7809 (CCN-98963)
Assigned:
2014-12-08
Published:
2014-12-08
Updated:
2018-10-09
Summary:
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
6.8 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
)
5.0 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
4.3 Medium
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
)
3.2 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-352
Vulnerability Consequences:
Bypass Security
References:
Source: MITRE
Type: CNA
CVE-2014-7809
Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html
Source: CCN
Type: SECTRACK ID: 1031309
Apache Struts Predictable Tokens Let Remote Users Bypass Cross-Site Request Forgery Protection
Source: CCN
Type: Apache Struts 2 Documentation S2-023
Generated value of token can be predictable
Source: CONFIRM
Type: Vendor Advisory
http://struts.apache.org/docs/s2-023.html
Source: CCN
Type: IBM Security Bulletin S1005078
IBM FlashSystem 840 and IBM FlashSystem V840, -AE1 models nodes are affected by vulnerabilities in Apaches Struts library (CVE-2014-7809)
Source: CCN
Type: IBM Security Bulletin S1005214
The IBM FlashSystem V840 product model numbers AC0 and AC1 nodes are affected by vulnerabilities in Apaches Struts library (CVE-2014-7809)
Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Source: CCN
Type: Oracle Critical Patch Update - April 2015
Oracle Critical Patch Update - April 2015
Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
Source: CCN
Type: Oracle Critical Patch Update - July 2015
Oracle Critical Patch Update - July 2015
Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Source: BUGTRAQ
Type: UNKNOWN
20141208 [ANN] Apache Struts 2.3.20 GA release available with security fix
Source: BID
Type: UNKNOWN
71548
Source: CCN
Type: BID-71548
Apache Struts CVE-2014-7809 Security Bypass Vulnerability
Source: SECTRACK
Type: UNKNOWN
1031309
Source: XF
Type: UNKNOWN
apache-struts-cve20147809-sec-bypass(98963)
Source: CCN
Type: IBM Security Bulletin 6620351 (Call Center for Commerce)
IBM Call Center and Apache Struts Struts upgrade strategy (various CVEs, see below)
Source: CCN
Type: IBM Security Bulletin 6620355 (Sterling Order Management)
IBM Sterling Order Management Apache Struts upgrade strategy (various CVEs, see below)
Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-7809
Vulnerable Configuration:
Configuration 1
:
cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.8:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.4:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.7:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.8:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.13:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.8:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.7:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.4:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.3:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
OR
cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:com.ubuntu.precise:def:20147809000
V
CVE-2014-7809 on Ubuntu 12.04 LTS (precise) - medium.
2014-12-10
oval:com.ubuntu.trusty:def:20147809000
V
CVE-2014-7809 on Ubuntu 14.04 LTS (trusty) - medium.
2014-12-10
BACK
apache
struts 2.0.0
apache
struts 2.0.1
apache
struts 2.0.2
apache
struts 2.0.3
apache
struts 2.0.4
apache
struts 2.0.5
apache
struts 2.0.6
apache
struts 2.0.7
apache
struts 2.0.8
apache
struts 2.0.9
apache
struts 2.0.10
apache
struts 2.0.11
apache
struts 2.0.11.1
apache
struts 2.0.11.2
apache
struts 2.0.12
apache
struts 2.0.13
apache
struts 2.0.14
apache
struts 2.1.0
apache
struts 2.1.1
apache
struts 2.1.2
apache
struts 2.1.3
apache
struts 2.1.4
apache
struts 2.1.5
apache
struts 2.1.6
apache
struts 2.1.8
apache
struts 2.1.8.1
apache
struts 2.2.1
apache
struts 2.2.1.1
apache
struts 2.2.3
apache
struts 2.2.3.1
apache
struts 2.3.1
apache
struts 2.3.1.1
apache
struts 2.3.1.2
apache
struts 2.3.3
apache
struts 2.3.4
apache
struts 2.3.4.1
apache
struts 2.3.7
apache
struts 2.3.8
apache
struts 2.3.12
apache
struts 2.3.14
apache
struts 2.3.14.1
apache
struts 2.3.14.2
apache
struts 2.3.14.3
apache
struts 2.3.15
apache
struts 2.3.15.1
apache
struts 2.3.15.2
apache
struts 2.3.15.3
apache
struts 2.3.16
apache
struts 2.3.16.1
apache
struts 2.3.16.2
apache
struts 2.3.16.3
apache
struts 2.0.1
apache
struts 2.0.5
apache
struts 2.0.6
apache
struts 2.0.9
apache
struts 2.0.10
apache
struts 2.0.11
apache
struts 2.0.11.1
apache
struts 2.0.11.2
apache
struts 2.1
apache
struts 2.0.0
apache
struts 2.0.12
apache
struts 2.0.13
apache
struts 2.0.14
apache
struts 2.0.2
apache
struts 2.0.3
apache
struts 2.0.4
apache
struts 2.0.7
apache
struts 2.1.0
apache
struts 2.1.1
apache
struts 2.1.2
apache
struts 2.1.3
apache
struts 2.1.4
apache
struts 2.1.5
apache
struts 2.1.6
apache
struts 2.1.8
apache
struts 2.1.8.1
apache
struts 2.2.1
apache
struts 2.2.1.1
apache
struts 2.2.3
apache
struts 2.3.1
apache
struts 2.3.14.3
apache
struts 2.3.13
apache
struts 2.3.14
apache
struts 2.3.15
apache
struts 2.3.15.3
apache
struts 2.2.3.1
apache
struts 2.3.8
apache
struts 2.3.7
apache
struts 2.3.4.1
apache
struts 2.3.4
apache
struts 2.3.3
apache
struts 2.3.1.2
apache
struts 2.3.1.1
apache
struts 2.3.12
apache
struts 2.3.14.2
apache
struts 2.3.14.1
apache
struts 2.3.15.1
apache
struts 2.3.16
apache
struts 2.3.15.2
apache
struts 2.3.16.1
apache
struts 2.3.16.2
apache
struts 2.3.16.3