Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:44681
HistoryDec 14, 2023 - 4:09 p.m.

Remote Code Execution (RCE)

2023-12-1416:09:57
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
17
remote code execution
apache struts
httpparameters.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

Low

0.09 Low

EPSS

Percentile

94.7%

org.apache.struts: struts2-core is vulnerable to Remote Code Execution. The vulnerability is due to the HttpParameters class in HttpParameters.java failing to sanitize parameters with different cases. The remove , get and contains methods treat parameters with different character cases as unique parameters, lacking case sensitivity checks. This allows attackers to manipulate file upload parameters, potentially leading to Path Traversal and Remote Code Execution.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

Low

0.09 Low

EPSS

Percentile

94.7%