cvelist/2017/9xxx/CVE-2017-9805.json

85 lines
2.5 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "security@apache.org",
"ID" : "CVE-2017-9805",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Apache Struts before 2.3.34 and 2.5.x before 2.5.13",
"version" : {
"version_data" : [
{
"version_value" : "Apache Struts before 2.3.34 and 2.5.x before 2.5.13"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The REST Plugin in Apache Struts 2.1.2 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "RCE"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.exploit-db.com/exploits/42627/"
},
{
"url" : "https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax"
},
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1488482"
},
{
"url" : "https://cwiki.apache.org/confluence/display/WW/S2-052"
},
{
"url" : "https://struts.apache.org/docs/s2-052.html"
},
{
"url" : "http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html"
},
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2"
},
{
"url" : "http://www.securityfocus.com/bid/100609"
},
{
"url" : "http://www.securitytracker.com/id/1039263"
}
]
}
}