CVE-2017-9805
KEV
🔴 Łataj teraz
Deserializacja XML w Apache Struts umożliwia zdalne wykonanie kodu.
CVSS
8.1
EPSS
94.3%
Exploit
weaponized
Vendor
cisco
Opis źródłowy (NVD)
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
deserialization exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.1 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 94.3% |
| Opublikowano (NVD) | 2017-09-15 19:29:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 16:55:43 UTC |
Referencje
- http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html (security@apache.org) [Patch, Third Party Advisory]
- http://www.securityfocus.com/bid/100609 (security@apache.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1039263 (security@apache.org) [Broken Link, Third Party Advisory, VDB Entry]
- https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax (security@apache.org) [Vendor Advisory]
- https://bugzilla.redhat.com/show_bug.cgi?id=1488482 (security@apache.org) [Issue Tracking, Third Party Advisory, VDB Entry]
- https://cwiki.apache.org/confluence/display/WW/S2-052 (security@apache.org) [Mitigation, Vendor Advisory]
- https://lgtm.com/blog/apache_struts_CVE-2017-9805 (security@apache.org) [Broken Link]
- https://security.netapp.com/advisory/ntap-20170907-0001/ (security@apache.org) [Third Party Advisory]
- https://struts.apache.org/docs/s2-052.html (security@apache.org) [Mitigation, Vendor Advisory]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2 (security@apache.org) [Third Party Advisory]
- https://www.exploit-db.com/exploits/42627/ (security@apache.org) [Exploit, Third Party Advisory, VDB Entry]
- https://www.kb.cert.org/vuls/id/112992 (security@apache.org) [Third Party Advisory, US Government Resource]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9805 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]