7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.02 Low
EPSS
Percentile
89.0%
The version of Apache Struts running on the remote host is 2.3.1 prior to 2.3.31 or 2.5.x prior to 2.5.5. It is, therefore, affected by a remote code execution vulnerability in the Convention plugin due to a flaw that allows traversing outside of a restricted path. An unauthenticated, remote attacker can exploit this, via a specially crafted URL which could be used for path traversal and execution of arbitrary code on the remote server.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(94336);
script_version("1.15");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");
script_cve_id("CVE-2016-6795");
script_bugtraq_id(93773);
script_name(english:"Apache Struts 2.3.1 < 2.3.31 / 2.5.x < 2.5.5 Convention Plugin Path Traversal RCE (S2-042)");
script_set_attribute(attribute:"synopsis", value:
"A web application running on the remote host uses a Java framework that is affected by a remote code execution
vulnerability");
script_set_attribute(attribute:"description", value:
"The version of Apache Struts running on the remote host is 2.3.1 prior to 2.3.31 or 2.5.x prior to 2.5.5. It is,
therefore, affected by a remote code execution vulnerability in the Convention plugin due to a
flaw that allows traversing outside of a restricted path. An unauthenticated, remote attacker can exploit this, via a
specially crafted URL which could be used for path traversal and execution of arbitrary code on the remote server.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://cwiki.apache.org/confluence/display/WW/S2-042
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?73075a47");
# https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.3.31
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4b6be1e7");
script_set_attribute(attribute:"solution", value:
"Upgrade to Apache Struts version 2.3.31 / 2.5.5 or later.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-6795");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/10/05");
script_set_attribute(attribute:"patch_publication_date", value:"2016/10/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/27");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:struts");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("os_fingerprint.nasl", "struts_detect_win.nbin", "struts_detect_nix.nbin", "struts_config_browser_detect.nbin");
script_require_ports("installed_sw/Apache Struts", "installed_sw/Struts");
exit(0);
}
include('vcf.inc');
app_info = vcf::combined_get_app_info(app:'Apache Struts');
vcf::check_granularity(app_info:app_info, sig_segments:3);
constraints = [
{ 'min_version' : '2.3.1', 'fixed_version' : '2.3.31' },
{ 'min_version' : '2.5.0', 'max_version' : '2.5.2', 'fixed_version' : '2.5.5' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.02 Low
EPSS
Percentile
89.0%