Version 1.2.9

struts

No description available.

Install Instructions

mvn install struts
Language Java

Find struts vulnerabilities in your supply chain.

Scan for Free

struts Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2005-3745 Medium 4.3 0.00297 0.68926
  • 1.1–1.2.7
CVE-2006-1546 High 7.5 0.00775 0.81141
  • 1.0.2–1.2.8
CVE-2006-1548 Medium 4.3 CWE-79 0.01459 0.86419
  • 1.0.2–1.2.8
CVE-2008-2025 Medium 4.3 CWE-79 0.00935 0.82802
  • 1.0.2–1.2.9
CVE-2012-1007 Medium 4.3 CWE-79 0.00543 0.77181
  • 1.0.2–1.2.9
CVE-2014-0114 High 7.5 CWE-20 0.97274 0.99931
  • 1.0.2–1.2.9
CVE-2015-0899 High 7.5 CWE-20 0.89936 0.99042
  • 1.1–1.2.9
CVE-2016-1181 High 8.1 CWE-400 0.0717 0.93955
  • 1.0.2–1.2.9
CVE-2016-1182 High 8.2 CWE-20 0.57488 0.97839
  • 1.0.2–1.2.9
CVE-2017-9787 High 7.5 CWE-284 0.02164 0.88991
  • 1.0.2–1.2.9
CVE-2017-9791 High 9.8 CWE-20 0.97508 0.99991
  • 1.0.2–1.2.9
CVE-2017-9793 High 7.5 CWE-20 0.9133 0.9913
  • 1.0.2–1.2.9
CVE-2017-9805 High 8.1 CWE-502 0.97393 0.99963
  • 1.0.2–1.2.9
CVE-2018-1327 High 7.5 CWE-20 0.00862 0.82076
  • 1.0.2–1.2.9
CVE-2006-1547 High 7.5 CWE-189 0.12144 0.95354
  • 1.2.7–1.2.8

struts Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2018-1327 The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-9805 The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-9793 The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-9791 The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2017-9787 When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-1182 ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2016-1181 ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2015-0899 The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter. 1.2.4, 1.2.7, 1.2.2, 1.2.8, 1.2.9, 1.1 Patch → NO_SAFE_VERSION
CVE-2014-0114 Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2012-1007 Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) struts-cookbook/processSimple.do or (3) struts-cookbook/processDyna.do. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2008-2025 Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters." 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.2.9, 1.1, 1.1-rc1 (Show all) Patch → NO_SAFE_VERSION
CVE-2006-1548 Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.1, 1.1-rc1, 1.1-rc2 (Show all) Patch → NO_SAFE_VERSION
CVE-2006-1547 ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils. 1.2.7, 1.2.8 Patch → NO_SAFE_VERSION
CVE-2006-1546 Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check. 1.2.4, 1.2.7, 1.2.2, 1.0.2, 1.2.8, 1.1, 1.1-rc1, 1.1-rc2 (Show all) Patch → NO_SAFE_VERSION
CVE-2005-3745 Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. 1.2.4, 1.2.7, 1.2.2, 1.1, 1.1-rc1, 1.1-rc2 Patch → NO_SAFE_VERSION

Instantly see if these struts vulnerabilities affect your code.

Scan for Free