CVE-2017-9805
high-risk
Published 2017-09-15
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
Do I need to act?
!
94.3% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (11)
References (25)
Broken Link
http://www.securityfocus.com/bid/100609
Broken Link
http://www.securitytracker.com/id/1039263
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1488482
Third Party Advisory
https://security.netapp.com/advisory/ntap-20170907-0001/
Mitigation
https://struts.apache.org/docs/s2-052.html
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2...
Third Party Advisory
https://www.kb.cert.org/vuls/id/112992
Broken Link
http://www.securityfocus.com/bid/100609
Broken Link
http://www.securitytracker.com/id/1039263
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1488482
Third Party Advisory
https://security.netapp.com/advisory/ntap-20170907-0001/
and 5 more references
67
/ 100
high-risk
Severity
24/34 · High
Exploitability
27/34 · High
Exposure
16/34 · Moderate