CVE-2016-3087

Scores

EPSS

0.870high87.0%
0%20%40%60%80%100%

Percentile: 87.0%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-20

Exploits

Exploit ID: 39919

Source: exploitdb

URL: https://www.exploit-db.com/exploits/39919

Exploit ID: 43382

Source: exploitdb

URL: https://www.exploit-db.com/exploits/43382

Vulnerable Software (3)

Type: Configuration

Product: libstruts1.2-java

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libstruts1.2-java

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: struts

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*",   ...

Source: nvd

End of list