CVE-2017-9791
critical-risk
Published 2017-07-10
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Do I need to act?
!
94.2% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (15)
Mitigation
http://struts.apache.org/docs/s2-048.html
Third Party Advisory
http://www.securityfocus.com/bid/99484
Third Party Advisory
http://www.securitytracker.com/id/1038838
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180706-0002/
Third Party Advisory
https://www.exploit-db.com/exploits/42324/
Third Party Advisory
https://www.exploit-db.com/exploits/44643/
Mitigation
http://struts.apache.org/docs/s2-048.html
Third Party Advisory
http://www.securityfocus.com/bid/99484
Third Party Advisory
http://www.securitytracker.com/id/1038838
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180706-0002/
Third Party Advisory
https://www.exploit-db.com/exploits/42324/
Third Party Advisory
https://www.exploit-db.com/exploits/44643/
89
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
34/34 · Critical
Exposure
23/34 · High