Apache Struts 2.x < 2.3.28.1 Multiple Vulnerabilities

critical Nessus Plugin ID 90773

Synopsis

The remote host contains a web application that uses a Java framework that is affected by multiple vulnerabilities.

Description

The version of Apache Struts running on the remote host is 2.x prior to 2.3.28.1. It is, therefore, affected by the following vulnerabilities :

- An unspecified flaw exists, related to chained expressions, when Dynamic Method Invocation (DMI) is enabled. An unauthenticated, remote attacker can exploit this, via a crafted expression, to execute arbitrary code. (CVE-2016-3081)

- A flaw exists in XSLTResult due to a failure to sanitize user-supplied input to the 'location' parameter when determining the location of an uploaded stylesheet.
An unauthenticated, remote attacker can exploit this, via a request to a crafted stylesheet, to execute arbitrary code. (CVE-2016-3082)

- A flaw exists that is triggered when dynamic method invocation is enabled while using the REST plugin. A remote attacker can exploit this, via a specially crafted expression, to execute arbitrary code.
(CVE-2016-3087) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Struts version 2.3.28.1 or later. Alternatively, apply the workarounds referenced in the vendor advisories.

See Also

https://struts.apache.org/docs/s2-031.html

https://struts.apache.org/docs/s2-032.html

https://struts.apache.org/docs/s2-033.html

http://struts.apache.org/docs/version-notes-23281.html

Plugin Details

Severity: Critical

ID: 90773

File Name: struts_2_3_28_1_win_local.nasl

Version: 1.20

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 4/28/2016

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-3082

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:struts

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/21/2016

Vulnerability Publication Date: 4/21/2016

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Apache Struts REST Plugin With Dynamic Method Invocation Remote Code Execution)

Elliot (Apache Struts Dynamic Method Invocation Expression Handling RCE)

Reference Information

CVE: CVE-2016-3081, CVE-2016-3082, CVE-2016-3087

BID: 87327