CookieInterceptor in Apache Struts before 2.3.16.2, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-0113 from the MITRE CVE dictionary dictionary and NIST NVD.
Not Vulnerable. This issue only affects struts 2, it does not affect the versions of struts as shipped with various Red Hat products.
Applications using a third-party struts 2 library, deployed to Red Hat JBoss products, may be affected. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/800293
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 7.5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | struts | Not affected |