Vulnerability Name: | CVE-2016-4003 (CCN-111514) |
Assigned: | 2016-03-15 |
Published: | 2016-03-15 |
Updated: | 2018-11-23 |
Summary: | Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter.
|
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None | 6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-79
|
Vulnerability Consequences: | Cross-Site Scripting |
References: | Source: MITRE Type: CNA CVE-2016-4003
Source: CONFIRM Type: Vendor Advisory http://struts.apache.org/docs/s2-028.html
Source: CCN Type: IBM Security Bulletin 1984206 (Connections) IBM Connections Mobile Server Security Refresh for Apache Struts (CVE-2016-0785, CVE-2016-0785, CVE-2016-3093, CVE-2016-4003)
Source: CCN Type: IBM Security Bulletin 1988934 (InfoSphere Information Server) Multiple Vulnerabilities in Struts v2 affect IBM InfoSphere Information Server
Source: CCN Type: IBM Security Bulletin 1994399 (Social Media Analytics) Vulnerability in Apache Struts affects IBM Social Media Analytics (CVE-2016-4003)
Source: BID Type: Third Party Advisory, VDB Entry 86311
Source: CCN Type: BID-86311 Apache Struts CVE-2016-4003 Cross Site Scripting Vulnerability
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1035268
Source: XF Type: UNKNOWN apache-struts-urldecoder-xss(111514)
Source: CONFIRM Type: Vendor Advisory https://issues.apache.org/jira/browse/WW-4507
Source: CCN Type: Apache Struts 2 Documentation S2-028 Use of a JRE with broken URLDecoder implementation may lead to XSS vulnerability in Struts 2 based web applications
Source: CCN Type: IBM Security Bulletin 6620351 (Call Center for Commerce) IBM Call Center and Apache Struts Struts upgrade strategy (various CVEs, see below)
Source: CCN Type: IBM Security Bulletin 6620355 (Sterling Order Management) IBM Sterling Order Management Apache Struts upgrade strategy (various CVEs, see below)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:struts:*:*:*:*:*:*:*:* (Version >= 2.0.0 and <= 2.3.24.1) Configuration CCN 1: cpe:/a:apache:struts:2.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.20:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.24:*:*:*:*:*:*:*AND cpe:/a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:4.5:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:4.0:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:5.0:*:*:*:*:*:*:*OR cpe:/a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:*OR cpe:/a:ibm:connections:5.5:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |