#VU90109 Cross-site request forgery in Apache Struts - CVE-2012-4386


Vulnerability identifier: #VU90109

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2012-4386

CWE-ID: CWE-352

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache Struts
Server applications / Frameworks for developing and running applications

Vendor: Apache Foundation

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to token check mechanism in Apache Struts does not properly validate the token name configuration parameter. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability..

Vulnerable software versions

Apache Struts: before 2.3.5, 2.3.5


External links
https://secunia.com/advisories/50420
https://struts.apache.org/2.x/docs/s2-010.html
https://www.openwall.com/lists/oss-security/2012/09/01/4
https://www.openwall.com/lists/oss-security/2012/09/01/5
https://www.securityfocus.com/bid/55346
https://exchange.xforce.ibmcloud.com/vulnerabilities/78182
https://issues.apache.org/jira/browse/WW-3858


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability