9.3
CVSSv2

CVE-2012-0391

Published: 08/01/2012 Updated: 23/11/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 980
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The ExceptionDelegator component in Apache Struts prior to 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote malicious users to execute arbitrary Java code via a crafted parameter.

Vulnerability Trend

Affected Products

Vendor Product Versions
ApacheStruts2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.11.1, 2.0.11.2, 2.0.12, 2.0.13, 2.0.14, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.8.1, 2.2.1, 2.2.1.1, 2.2.3

Vendor Advisories

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...
SEC Consult Vulnerability Lab Security Advisory < 20120104-0 > ======================================================================= title: Multiple critical vulnerabilities in Apache Struts2 product: Apache Struts2 * OpenSymphony XWork * OpenSymphony OGNL vulnerable versi ...

Metasploit Modules

Apache Struts Remote Command Execution

This module exploits a remote command execution vulnerability in Apache Struts versions < 2.2.1.1. This issue is caused because the ExceptionDelegator interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.

msf > use exploit/multi/http/struts_code_exec_exception_delegator
      msf exploit(struts_code_exec_exception_delegator) > show targets
            ...targets...
      msf exploit(struts_code_exec_exception_delegator) > set TARGET <target-id>
      msf exploit(struts_code_exec_exception_delegator) > show options
            ...show and set options...
      msf exploit(struts_code_exec_exception_delegator) > exploit