Lucene search

K
huaweiHuawei TechnologiesHUAWEI-SA-20130730-STRUTS
HistoryJul 30, 2013 - 12:00 a.m.

Security Advisory-Multiple Apache Struts2 Vulnerabilities in Huawei Products

2013-07-3000:00:00
Huawei Technologies
www.huawei.com
91

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.973

Percentile

99.9%

Apache Struts2 is a second-generation and enterprise-ready Java web application framework based on the Model-View-Controller (MVC) architecture. This advisory describes four vulnerabilities of Apache Struts 2.0.0 - 2.3.15. Huawei products and applications using the above versions of Apache Struts are therefore affected by the vulnerabilities, not due to a defect of the Huawei product or application.

The Apache Struts2 contains the vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks.( Vulnerability ID : HWNSIRT-2013-0601) The link is at http://struts.apache.org/release/2.3.x/docs/s2-014.html (CVE-2013-2115, CVE-2013-1966)

The Apache Struts2 contains the vulnerability introduced by wildcard matching mechanism or double evaluation of OGNL Expression allows remote command execution.( Vulnerability ID : HWNSIRT-2013-0704) The link is at <http://struts.apache.org/release/2.3.x/docs/s2-015.html&gt; (CVE-2013-2134, CVE-2013-2135)

The Apache Struts2 contains the vulnerability introduced by manipulating parameters prefixed with “action:”/“redirect:”/“redirectAction:”, which may result in remote command execution. (Vulnerability ID : HWNSIRT-2013-0705) .The link is at <http://struts.apache.org/release/2.3.x/docs/s2-016.html&gt; (CVE-2013-2251).

The Apache Struts2 contains the vulnerability introduced by manipulating parameters prefixed with “redirect:”/“redirectAction:” which allows open redirects. (Vulnerability ID : HWNSIRT-2013-0706). The link is at <http://struts.apache.org/release/2.3.x/docs/s2-017.html&gt; (CVE-2013-2248).

Apache released Struts 2.3.15.1 as an official patch for Struts 2. Upgrading to Struts 2.3.15.1 is the only workaround. Based on the Struts 2.3.15.1 patch, Huawei provides a fix for the vulnerability.

Affected configurations

Vulners
Node
huaweigalax8800_firmwareMatchv100r002c00
OR
huaweigalax8800_firmwareMatchv100r002c01
OR
huaweigalax8800_firmwareMatchv100r002c83
OR
huaweigalax8800_firmwareMatchv100r002c85
OR
huaweidc_integration_solution_firmwareMatchv100r001c02
OR
huaweiportal_firmwareMatchv100r002c00
OR
huaweiportal_firmwareMatchv100r002c01
OR
huaweiportal_firmwareMatchv100r002c83
OR
huaweioceanstor_cse_firmwareMatchv100r002
OR
huaweioceanstor_sns3096_firmwareMatchv100r001
OR
huaweifusionaccessMatchv100r003c00
OR
huaweifusionmanagerMatchv100r003c00
OR
huaweioceanstor_uds_firmwareMatchv100r001c00
OR
huaweimanageoneMatchv100r001c02
OR
huaweivtm_firmwareMatchv100r001c01
OR
huaweiespace_meetingMatchv100r001c01
OR
huaweiespace_meetingMatchv100r001c02
OR
huaweiespace_firmwareMatchv100r001c01
OR
huaweiespace_firmwareMatchv100r001c02
OR
huaweiespace_firmwareMatchv100r001c02spc300
OR
huaweiespace_firmwareMatchv100r002c01
OR
huaweiespace_firmwareMatchv200r001c01
OR
huaweiespace_firmwareMatchv200r001c02
OR
huaweiespace_firmwareMatchv200r001c01
OR
huaweiespace_firmwareMatchv200r001c02
OR
huaweiespace_firmwareMatchv200r001c01
OR
huaweiespace_firmwareMatchv200r001c02
OR
huaweiespace_firmwareMatchv200r001c03
OR
huaweidsm_firmwareMatchv100r002c03
OR
huaweidsm_firmwareMatchv100r002c05
OR
huaweielog_firmwareMatchv100r003c01
OR
huaweiisoc_firmwareMatchv200r001c00
OR
huaweiisoc_firmwareMatchv200r001c02
OR
huaweitsm_firmwareRange<V100R002C07
OR
huaweiseco_vsm_firmwareMatchv200r002c00
OR
huaweiesightMatchv200r002c00
OR
huaweiesightMatchv200r002c01
OR
huaweiesightMatchv200r003c00
OR
huaweiesightMatchv300r001c00
OR
huaweianti-ddos_firmwareMatchv100r001c00spc300
OR
huaweiasg2100_firmwareMatchv100r001c00
OR
huaweinip_firmwareMatchv100r001c00
OR
huaweinip_firmwareMatchv100r001c01
OR
huaweinip_firmwareMatchv100r002c00
OR
huaweielte3.1.0_firmwareMatchv300r001c00
OR
huaweihostagent_firmwareMatchv100r003c00
VendorProductVersionCPE
huaweigalax8800_firmwarev100r002c00cpe:2.3:a:huawei:galax8800_firmware:v100r002c00:*:*:*:*:*:*:*
huaweigalax8800_firmwarev100r002c01cpe:2.3:a:huawei:galax8800_firmware:v100r002c01:*:*:*:*:*:*:*
huaweigalax8800_firmwarev100r002c83cpe:2.3:a:huawei:galax8800_firmware:v100r002c83:*:*:*:*:*:*:*
huaweigalax8800_firmwarev100r002c85cpe:2.3:a:huawei:galax8800_firmware:v100r002c85:*:*:*:*:*:*:*
huaweidc_integration_solution_firmwarev100r001c02cpe:2.3:a:huawei:dc_integration_solution_firmware:v100r001c02:*:*:*:*:*:*:*
huaweiportal_firmwarev100r002c00cpe:2.3:a:huawei:portal_firmware:v100r002c00:*:*:*:*:*:*:*
huaweiportal_firmwarev100r002c01cpe:2.3:a:huawei:portal_firmware:v100r002c01:*:*:*:*:*:*:*
huaweiportal_firmwarev100r002c83cpe:2.3:a:huawei:portal_firmware:v100r002c83:*:*:*:*:*:*:*
huaweioceanstor_cse_firmwarev100r002cpe:2.3:o:huawei:oceanstor_cse_firmware:v100r002:*:*:*:*:*:*:*
huaweioceanstor_sns3096_firmwarev100r001cpe:2.3:o:huawei:oceanstor_sns3096_firmware:v100r001:*:*:*:*:*:*:*
Rows per page:
1-10 of 421

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.973

Percentile

99.9%