|Number of vulnerabilities||1|
|CVE ID|| CVE-2014-0050
|CWE ID|| CWE-400
|Public exploit||This vulnerability is being exploited in the wild.|
Server applications / Frameworks for developing and running applications
This security advisory describes one high risk vulnerability.
The vulnerability allows a remote attacker to cause DoS conditions on the target system.
The weakness exists due to boundary error when handling Content-Type HTTP header for multipart requests. By sending a specially crafted Content-Type header, containing 4092 characters in "boundary" field, a remote attacker can cause the application to enter into an infinite loop.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
Note: the vulnerability was being actively exploited.
Install update from vendor's website.Vulnerable software versions
Apache Struts: 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 220.127.116.11, 2.2.0, 2.2.1, 18.104.22.168, 2.2.2, 2.2.3, 22.214.171.124, 2.3.1, 126.96.36.199, 188.8.131.52, 2.3.2, 2.3.3, 2.3.4, 184.108.40.206, 2.3.5, 2.3.6, 2.3.7, 2.3.8, 2.3.9, 2.3.10, 2.3.11, 2.3.12, 2.3.13, 2.3.14, 220.127.116.11, 18.104.22.168, 22.214.171.124, 2.3.15, 126.96.36.199, 188.8.131.52, 184.108.40.206, 2.3.16CPE
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.