CVE-2017-9805

Scores

EPSS

0.944High94.4%
0%20%40%60%80%100%

Percentile: 94.4%

CVSS

8.1High3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-20CWE-502

Related Vulnerabilities

Exploits

Exploit ID: 42627

Source: exploitdb

URL: https://www.exploit-db.com/exploits/42627

Exploit ID: CVE-2017-9805

Source: github-poc

URL: https://github.com/Shakun8/CVE-2017-9805

Recommendations

Source: nvd

Apply an updateThe vendor has released version 2.5.13 to address this vulnerability. No workaround is possible according to the vendor, so patching is strongly recommended.Remove or limit the REST pluginIf it is not used, consider removing the REST plugin. Per the vendor, it is also possible to limit its functionality to normal server pages or JSON with the following configuration change in struts.xml:

URL: https://www.kb.cert.org/vuls/id/112992

Vulnerable Software (10)

Type: Configuration

Product: libstruts1.2-java

Operating System: ubuntu trusty 14.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: libstruts1.2-java

Operating System: debian

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Product: libstruts1.2-java

Operating System: debian wheezy 7

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Vendor: apache

Product: struts

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.3.34",
      "versionStartIncluding": "2.1.2",
      "vulnerable": true
    },
   ...

Source: nvd

Type: Configuration

Vendor: cisco

Product: digital_media_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:hosted_collaboration_soluti...

Source: nvd

Type: Configuration

Vendor: cisco

Product: hosted_collaboration_solution

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:hosted_collaboration_soluti...

Source: nvd

Type: Configuration

Vendor: cisco

Product: media_experience_engine

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:hosted_collaboration_soluti...

Source: nvd

Type: Configuration

Vendor: cisco

Product: network_performance_analysis

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:hosted_collaboration_soluti...

Source: nvd

Type: Configuration

Vendor: cisco

Product: video_distribution_suite_for_internet_streaming

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:hosted_collaboration_soluti...

Source: nvd

Type: Configuration

Vendor: netapp

Product: oncommand_balance

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd