Vulnerability Name:

CVE-2018-1327 (CCN-140766)

Assigned:2017-12-07
Published:2018-03-27
Updated:2020-12-08
Summary:The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2018-1327

Source: CONFIRM
Type: Patch, Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Source: BID
Type: Third Party Advisory, VDB Entry
103516

Source: CCN
Type: BID-103516
Apache Struts CVE-2018-1327 Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1040575

Source: CCN
Type: Apache Struts 2 Documentation S2-056
A crafted XML request can be used to perform a DoS attack when using the Struts REST plugin

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://cwiki.apache.org/confluence/display/WW/S2-056

Source: XF
Type: UNKNOWN
apache-struts-cve20181327-dos(140766)

Source: MLIST
Type: UNKNOWN
[struts-issues] 20201207 [jira] [Created] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327

Source: MLIST
Type: UNKNOWN
[struts-issues] 20201207 [jira] [Updated] (WW-5105) Tracking the fix commit of CVE-2005-3745 and CVE-2018-1327

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20180330-0001/

Source: CCN
Type: IBM Security Bulletin 2017002 (Security Guardium)
IBM Security Guardium is affected by a Public disclosed vulnerability from Apache Struts vulnerability

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2018-1327

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:struts:*:*:*:*:*:*:*:* (Version >= 2.1.1 and <= 2.5.14.1)

  • Configuration CCN 1:
  • cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.14.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.20.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.28.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.20.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.21:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.24.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.3.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:struts:2.5.9:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:security_guardium:10.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:10.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20181327000
    V
    CVE-2018-1327 on Ubuntu 14.04 LTS (trusty) - medium.
    2018-03-27
    BACK
    apache struts *
    apache struts 2.1.1
    apache struts 2.1.2
    apache struts 2.1.3
    apache struts 2.1.4
    apache struts 2.1.5
    apache struts 2.1.6
    apache struts 2.1.8
    apache struts 2.1.8.1
    apache struts 2.2.1
    apache struts 2.2.1.1
    apache struts 2.2.3
    apache struts 2.3.1
    apache struts 2.3.14.3
    apache struts 2.3.13
    apache struts 2.3.14
    apache struts 2.3.15
    apache struts 2.3.15.3
    apache struts 2.2.3.1
    apache struts 2.3.8
    apache struts 2.3.7
    apache struts 2.3.4.1
    apache struts 2.3.4
    apache struts 2.3.3
    apache struts 2.3.1.2
    apache struts 2.3.1.1
    apache struts 2.3.12
    apache struts 2.3.14.2
    apache struts 2.3.14.1
    apache struts 2.3.15.1
    apache struts 2.3.16
    apache struts 2.3.15.2
    apache struts 2.3.16.1
    apache struts 2.3.16.2
    apache struts 2.3.16.3
    apache struts 2.3.20
    apache struts 2.3.24
    apache struts 2.3.24.1
    apache struts 2.3.28
    apache struts 2.3.30
    apache struts 2.3.5
    apache struts 2.5
    apache struts 2.5.10
    apache struts 2.5.11
    apache struts 2.5.12
    apache struts 2.5.5
    apache struts 2.5.1
    apache struts 2.5.2
    apache struts 2.5.8
    apache struts 2.5.10.1
    apache struts 2.5.13
    apache struts 2.5.14
    apache struts 2.5.14.1
    apache struts 2.5.16
    apache struts 2.3.20.1
    apache struts 2.3.20.3
    apache struts 2.3.24.3
    apache struts 2.3.28.1
    apache struts 2.3.29
    apache struts 2.3.31
    apache struts 2.3.32
    apache struts 2.3.33
    apache struts 2.3.34
    apache struts 2.3.6
    apache struts 2.3.9
    apache struts 2.3.10
    apache struts 2.3.11
    apache struts 2.3.14.3
    apache struts 2.3.15
    apache struts 2.3.17
    apache struts 2.3.19
    apache struts 2.3.20.2
    apache struts 2.3.21
    apache struts 2.3.22
    apache struts 2.3.23
    apache struts 2.3.24.2
    apache struts 2.3.25
    apache struts 2.3.26
    apache struts 2.3.27
    apache struts 2.5.16
    apache struts 2.5.4
    apache struts 2.5.6
    apache struts 2.5.7
    apache struts 2.5.9
    ibm security guardium 10.1.4
    ibm security guardium 10.5