7.5
CVSSv3

CVE-2018-1327

Published: 27/03/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache struts

Vendor Advisories

The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload Upgrade to the Apache Struts version 2516 and switch to an optional Jackson XML handler as described here strutsapacheorg/plugins/rest/#custom-contenttypehandlers An ...

Github Repositories

Search for RedHat/Ubuntu security updates

cvesearch Just gimme the list & I'll do the work for you None of us are happy about this though Improved speed by up to 100x [root@josh9580-cvesearch ~]# time cve-savepy >/dev/null real 0m0164s user 0m0129s sys 0m0035s [root@josh9580-cvesearch ~]# time cve-checkpy CVE-2017-0861 >/dev/null real 0m3098s user 0m2049s sys 0m0051s [root@josh958