Vulnerability Name: | CVE-2019-0233 (CCN-186699) |
Assigned: | 2018-11-14 |
Published: | 2020-08-11 |
Updated: | 2022-04-18 |
Summary: | An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
|
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-281
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2019-0233
Source: CCN Type: JVN#50890770 Apache Struts 2 vulnerable to denial-of-service (DoS)
Source: CCN Type: Apache Struts 2 Documentation S2-060 Access permission override causing a Denial of Service when performing a file upload
Source: MISC Type: Vendor Advisory https://cwiki.apache.org/confluence/display/ww/s2-060
Source: XF Type: UNKNOWN apache-struts-cve20190233-dos(186699)
Source: MISC Type: Permissions Required, Third Party Advisory https://launchpad.support.sap.com/#/notes/2982840
Source: CCN Type: IBM Security Bulletin 6324787 (Sterling File Gateway) Multiple Security Vulnerabilities in Apache Struts Affect IBM Sterling File Gateway (CVE-2019-0233, CVE-2019-0230)
Source: CCN Type: IBM Security Bulletin 6336355 (Tivoli Netcool OMNIbus) Multiple vulnerabilities in Apache Struts affect Tivoli Netcool/OMNIbus WebGUI (CVE-2019-0233, CVE-2019-0230)
Source: CCN Type: IBM Security Bulletin 6347964 (Tivoli Application Dependency Discovery Manager) Vulnerabilities in Apache Struts affect IBM Tivoli Application Dependency Discovery Manager.
Source: CCN Type: IBM Security Bulletin 6356619 (Content Collector) Apache Struts (Publicly disclosed vulnerability) affects Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections
Source: CCN Type: IBM Security Bulletin 6356621 (Content Collector) Apache Struts (Publicly disclosed vulnerability) affects Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections
Source: CCN Type: IBM Security Bulletin 6359443 (Content Collector) Apache Struts (Publicly disclosed vulnerability) affects Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections
Source: CCN Type: IBM Security Bulletin 6359445 (Content Collector) Apache Struts (Publicly disclosed vulnerability) affects Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections
Source: CCN Type: IBM Security Bulletin 6565845 (Sterling Order Management) IBM Sterling Order Management Apache Struts vulnerablity
Source: CCN Type: IBM Security Bulletin 6620351 (Call Center for Commerce) IBM Call Center and Apache Struts Struts upgrade strategy (various CVEs, see below)
Source: CCN Type: IBM Security Bulletin 6620355 (Sterling Order Management) IBM Sterling Order Management Apache Struts upgrade strategy (various CVEs, see below)
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuApr2021.html
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html
Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2021.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:struts:*:*:*:*:*:*:*:* (Version >= 2.0.0 and <= 2.5.20) Configuration 2: cpe:/a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*OR cpe:/a:oracle:financial_services_data_integration_hub:8.0.3:*:*:*:*:*:*:*OR cpe:/a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:*OR cpe:/a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*OR cpe:/a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* (Version <= 8.0.23) Configuration CCN 1: cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.13:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.2.3.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.7:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.4.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.20:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.24:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.24.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.28:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.30:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.10:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.11:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.12:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.5:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.8:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.10.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.13:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.14:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.14.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.16:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.20.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.20.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.24.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.28.1:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.29:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.31:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.32:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.33:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.34:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.9:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.10:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.11:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.17:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.19:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.20.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.21:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.22:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.23:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.24.2:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.25:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.26:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.3.27:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.16:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.4:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.6:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.7:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.9:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.17:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.18:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.19:*:*:*:*:*:*:*OR cpe:/a:apache:struts:2.5.20:*:*:*:*:*:*:*AND cpe:/a:ibm:tivoli_netcool/omnibus:8.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_file_gateway:2.2.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.7:*:*:*:*:*:*:*OR cpe:/a:ibm:content_collector:4.0.1.10:*:*:*:*:*:*:*OR cpe:/a:ibm:sterling_file_gateway:6.0.3.2:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
apache struts *
oracle communications policy management 12.5.0
oracle financial services data integration hub 8.0.3
oracle financial services data integration hub 8.0.6
oracle financial services market risk measurement and management 8.0.6
oracle mysql enterprise monitor *
apache struts 2.0.1
apache struts 2.0.5
apache struts 2.0.6
apache struts 2.0.9
apache struts 2.0.10
apache struts 2.0.11
apache struts 2.0.11.1
apache struts 2.0.11.2
apache struts 2.1
apache struts 2.0.0
apache struts 2.0.12
apache struts 2.0.13
apache struts 2.0.14
apache struts 2.0.2
apache struts 2.0.3
apache struts 2.0.4
apache struts 2.0.7
apache struts 2.1.0
apache struts 2.1.1
apache struts 2.1.2
apache struts 2.1.3
apache struts 2.1.4
apache struts 2.1.5
apache struts 2.1.6
apache struts 2.1.8
apache struts 2.1.8.1
apache struts 2.2.1
apache struts 2.2.1.1
apache struts 2.2.3
apache struts 2.3.1
apache struts 2.3.14.3
apache struts 2.3.13
apache struts 2.3.14
apache struts 2.3.15
apache struts 2.3.15.3
apache struts 2.2.3.1
apache struts 2.3.8
apache struts 2.3.7
apache struts 2.3.4.1
apache struts 2.3.4
apache struts 2.3.3
apache struts 2.3.1.2
apache struts 2.3.1.1
apache struts 2.3.12
apache struts 2.3.14.2
apache struts 2.3.14.1
apache struts 2.3.15.1
apache struts 2.3.16
apache struts 2.3.15.2
apache struts 2.3.16.1
apache struts 2.3.16.2
apache struts 2.3.16.3
apache struts 2.3.20
apache struts 2.3.24
apache struts 2.3.24.1
apache struts 2.3.28
apache struts 2.3.30
apache struts 2.3.5
apache struts 2.5
apache struts 2.5.10
apache struts 2.5.11
apache struts 2.5.12
apache struts 2.5.5
apache struts 2.5.1
apache struts 2.5.2
apache struts 2.5.8
apache struts 2.5.10.1
apache struts 2.5.13
apache struts 2.5.14
apache struts 2.5.14.1
apache struts 2.5.16
apache struts 2.3.20.1
apache struts 2.3.20.3
apache struts 2.3.24.3
apache struts 2.3.28.1
apache struts 2.3.29
apache struts 2.3.31
apache struts 2.3.32
apache struts 2.3.33
apache struts 2.3.34
apache struts 2.3.6
apache struts 2.3.9
apache struts 2.3.10
apache struts 2.3.11
apache struts 2.3.14.3
apache struts 2.3.15
apache struts 2.3.17
apache struts 2.3.19
apache struts 2.3.20.2
apache struts 2.3.21
apache struts 2.3.22
apache struts 2.3.23
apache struts 2.3.24.2
apache struts 2.3.25
apache struts 2.3.26
apache struts 2.3.27
apache struts 2.5.16
apache struts 2.5.4
apache struts 2.5.6
apache struts 2.5.7
apache struts 2.5.9
apache struts 2.5.17
apache struts 2.5.18
apache struts 2.5.19
apache struts 2.5.20
ibm tivoli netcool/omnibus 8.1.0
ibm sterling file gateway 2.2.0.0
ibm tivoli application dependency discovery manager 7.3.0.7
ibm content collector 4.0.1.10
ibm sterling file gateway 6.0.3.2