CVE-2014-0114
Published Apr 30, 2014
Last updated 2 years ago
Overview
- Description
- Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:commons_beanutils:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02FF6542-F5F7-465D-9755-E4EFC8953453", "versionEndIncluding": "1.9.1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5051228-446E-461D-9B5F-8F765C7BA57F" }, { "criteria": "cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE1B8A83-43A4-4C4F-BB95-4D9CAD882D1C" }, { "criteria": "cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A55DDFE1-A8AB-47BB-903E-957FCF3D023D" }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93FA9AE3-B453-4FE6-82A9-7DDEF3F6C464" }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3BB6FBE-469B-4920-A30B-33AD9E41ACCD" }, { "criteria": "cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34FC82D3-CCAF-4F37-B531-2A9CA17311A9" }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0B8B413-8C62-44B6-A382-26F35F4573D4" }, { "criteria": "cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6309C679-890A-4214-8857-9F119CBBAA00" }, { "criteria": "cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD882860-03D0-49E9-8CED-DE6663392548" }, { "criteria": "cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDDD509E-9EBF-483F-9546-A1A3A1A3380E" }, { "criteria": "cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2ECF5E1-457F-4E76-81F7-65114DC4E1E4" }, { "criteria": "cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FC81E1A-2779-4FAF-866C-970752CD1828" }, { "criteria": "cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBD69FAE-C1A3-4213-824A-7DCCE357EB01" }, { "criteria": "cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C34FDB0-2778-4C36-8345-F7E27509A383" }, { "criteria": "cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF0302D3-CB8D-4FA7-8F07-C2C7593877BE" }, { "criteria": "cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03906D34-F3B3-4C56-A6A6-2F7A10168501" }, { "criteria": "cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B3872B7-2972-433D-96A1-154FA545B311" } ], "operator": "OR" } ] } ]