Selligent Message Studio Struts Code Execution (CVE-2013-2251)

critical Nessus Plugin ID 142462

Synopsis

The remote web application is affected by a code execution vulnerability.

Description

The instance of Selligent Message Studio running on the remote host is affected by CVE-2013-2251, a code execution vulnerability in Apache Struts (S2-016). A remote, unauthenticated attacker can exploit this issue, via a specially crafted HTTP request, to execute code on the remote host.

Solution

Contact the vendor for a solution.

See Also

https://cwiki.apache.org/confluence/display/WW/S2-016

http://www.nessus.org/u?efc7881a

Plugin Details

Severity: Critical

ID: 142462

File Name: selligent_message_studio_CVE-2013-2251.nbin

Version: 1.77

Type: remote

Family: CGI abuses

Published: 11/5/2020

Updated: 11/22/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-2251

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/a:selligent:selligent_message_studio

Required KB Items: installed_sw/Selligent Message Studio

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 7/16/2013

Vulnerability Publication Date: 7/9/2013

CISA Known Exploited Vulnerability Due Dates: 4/15/2022

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution)

Elliot (Apache-Struts DefaultActionMapper < 2.3.15.1 RCE Linux)

Reference Information

CVE: CVE-2013-2251

BID: 61189