Summary
This host is running Apache Struts Showcase and is prone to java method execution vulnerability.
Impact
Successful exploitation could allow an attacker to execute arbitrary java method. Further that results to disclose environment variables or cause a denial of service or an arbitrary OS command can be executed.
Impact Level: System/Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to an improper validation of user data passed to the 'skillName' parameter in 'edit' and 'save' actions.
Affected
Apache Struts2 (Showcase) version 2.3.4.1 and prior
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AjaXplorer zoho plugin Directory Traversal Vulnerability
- Awstats Configuration File Remote Arbitrary Command Execution Vulnerability
- ASAS Server End User Self Service (EUSS) SQL Injection Vulnerability
- appRain CMF SQL Injection And Cross Site Scripting Vulnerabilities
- Apache Struts2 Redirection and Security Bypass Vulnerabilities