Vulnerability identifier: #VU90109
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-352
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Apache Struts
Server applications /
Frameworks for developing and running applications
Vendor: Apache Foundation
Description
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to token check mechanism in Apache Struts does not properly validate the token name configuration parameter. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability..
Vulnerable software versions
Apache Struts: before 2.3.5, 2.3.5
External links
https://secunia.com/advisories/50420
https://struts.apache.org/2.x/docs/s2-010.html
https://www.openwall.com/lists/oss-security/2012/09/01/4
https://www.openwall.com/lists/oss-security/2012/09/01/5
https://www.securityfocus.com/bid/55346
https://exchange.xforce.ibmcloud.com/vulnerabilities/78182
https://issues.apache.org/jira/browse/WW-3858
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.