#VU71647 Cross-site scripting in Apache Struts - CVE-2012-1007
Published: January 30, 2023
Apache Struts
Apache Foundation
Description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in Apache Struts when processing the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to struts-cookbook/processSimple.do or struts-cookbook/processDyna.do. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt
- http://secpod.org/blog/?p=450
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/51900
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73052