Vulnerability Name:

CVE-2016-4003 (CCN-111514)

Assigned:2016-03-15
Published:2016-03-15
Updated:2018-11-23
Summary:Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter.
CVSS v3 Severity:6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2016-4003

Source: CONFIRM
Type: Vendor Advisory
http://struts.apache.org/docs/s2-028.html

Source: CCN
Type: IBM Security Bulletin 1984206 (Connections)
IBM Connections Mobile Server Security Refresh for Apache Struts (CVE-2016-0785, CVE-2016-0785, CVE-2016-3093, CVE-2016-4003)

Source: CCN
Type: IBM Security Bulletin 1988934 (InfoSphere Information Server)
Multiple Vulnerabilities in Struts v2 affect IBM InfoSphere Information Server

Source: CCN
Type: IBM Security Bulletin 1994399 (Social Media Analytics)
Vulnerability in Apache Struts affects IBM Social Media Analytics (CVE-2016-4003)

Source: BID
Type: Third Party Advisory, VDB Entry
86311

Source: CCN
Type: BID-86311
Apache Struts CVE-2016-4003 Cross Site Scripting Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1035268

Source: XF
Type: UNKNOWN
apache-struts-urldecoder-xss(111514)

Source: CONFIRM
Type: Vendor Advisory
https://issues.apache.org/jira/browse/WW-4507

Source: CCN
Type: Apache Struts 2 Documentation S2-028
Use of a JRE with broken URLDecoder implementation may lead to XSS vulnerability in Struts 2 based web applications

Source: CCN
Type: IBM Security Bulletin 6620351 (Call Center for Commerce)
IBM Call Center and Apache Struts Struts upgrade strategy (various CVEs, see below)

Source: CCN
Type: IBM Security Bulletin 6620355 (Sterling Order Management)
IBM Sterling Order Management Apache Struts upgrade strategy (various CVEs, see below)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:struts:*:*:*:*:*:*:*:* (Version >= 2.0.0 and <= 2.3.24.1)

  • Configuration CCN 1:
  • cpe:/a:apache:struts:2.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.24:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:4.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:connections:5.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20164003000
    V
    CVE-2016-4003 on Ubuntu 12.04 LTS (precise) - medium.
    2016-04-12
    oval:com.ubuntu.trusty:def:20164003000
    V
    CVE-2016-4003 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-04-12
    BACK
    apache struts *
    apache struts 2.0.8
    apache struts 2.0.1
    apache struts 2.0.5
    apache struts 2.0.6
    apache struts 2.0.9
    apache struts 2.0.10
    apache struts 2.0.11
    apache struts 2.0.11.1
    apache struts 2.0.11.2
    apache struts 2.0.0
    apache struts 2.0.12
    apache struts 2.0.13
    apache struts 2.0.14
    apache struts 2.0.2
    apache struts 2.0.3
    apache struts 2.0.4
    apache struts 2.0.7
    apache struts 2.1.0
    apache struts 2.1.1
    apache struts 2.1.2
    apache struts 2.1.3
    apache struts 2.1.4
    apache struts 2.1.5
    apache struts 2.1.6
    apache struts 2.1.8
    apache struts 2.1.8.1
    apache struts 2.2.1
    apache struts 2.2.1.1
    apache struts 2.2.3
    apache struts 2.3.1
    apache struts 2.3.14.3
    apache struts 2.3.14
    apache struts 2.3.15.3
    apache struts 2.3.1.2
    apache struts 2.3.1.1
    apache struts 2.3.12
    apache struts 2.3.14.2
    apache struts 2.3.14.1
    apache struts 2.3.15.1
    apache struts 2.3.16
    apache struts 2.3.15.2
    apache struts 2.3.16.1
    apache struts 2.3.16.2
    apache struts 2.3.16.3
    apache struts 2.3.20
    apache struts 2.3.24
    ibm infosphere information server 8.5
    ibm infosphere information server 8.7
    ibm infosphere information server 9.1
    ibm connections 4.5
    ibm connections 4.0
    ibm infosphere information server 11.3
    ibm connections 5.0
    ibm infosphere information server 11.5
    ibm connections 5.5