5
CVSSv2

CVE-2014-0094

Published: 11/03/2014 Updated: 12/08/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 511
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The ParametersInterceptor in Apache Struts prior to 2.3.16.2 allows remote malicious users to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache struts

Vendor Advisories

Debian Bug report logs - #745897 libstruts12-java: CVE-2014-0114 Package: libstruts12-java; Maintainer for libstruts12-java is (unknown); Reported by: Nobuhiro Ban <bannobuhiro@gmailcom> Date: Sat, 26 Apr 2014 12:21:01 UTC Severity: grave Tags: security Found in version libstruts12-java/129-8 Fixed in version libs ...
The ParametersInterceptor in Apache Struts before 23161 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method ...

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ManualRanking # It's going to manipulate the Class Loader include Msf::Exploit::Remote::HttpClient include Msf::Exploit::EXE include ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking # It's going to manipulate the Class Loader include Msf::Exploit::FileDropper include Msf::Exploit::EXE include M ...

Github Repositories

CVE-2014-0094 検証用。 piyologhatenadiaryjp/entry/20140417/1397750197 を参考に、 vulhub/java:7u55-jdk tomcat-805 struts-2316 を再現。classLoaderは動いてるけど、肝心のログがパーセントエンコードされちゃってるのでRCEまでつながらない >< windowsバージョンも追加(7u191だけど・・・)。

Additional materials for RootedCON 2015 Apache Struts talk

CVE-2014-0094 / CVE -2014-0114 Struts Tester This PoC gives a list of payloads that can be used to modify data in the context of a Struts web application that is vulnerable to CVE-2014-0094 or CVE-2014-0114 The results depend on the container that executes the application Is a customized version for the PoC posted by "neobyte" at secbaiducom/indexphp?resea

CVE-2014-0094 test program for struts1

CVE-2014-0094 のstruts1 対応について はじめに CVE-2014-0094 のstruts1の影響についてまとめる。 特に断りがない限り、各バージョンは、java 170_02,struts 1310, apache-tomcat-6039、FreeBSD 82 で確認を行った。 なお、いかなる場合も、ソース、文章等の内容については保証しない。 また、いかなる

CVE-2014-0114 - Sårbarhet i Struts 1 Parametrar i en POST- eller GET-request hanteras som egenskaper (properties) som ska sättas med formuläret som utgångspunkt Parametrar kan vara en sökväg till ett nästlat objekt Apache Struts 1x kan manipuleras att anropa getClass() på Form Beans Tex kan man direkt manipulera attribut på