HTTP: Apache Struts2 ParametersInterceptor Remote Command Execution

This signature detects attempts to exploit a known vulnerability against Apache Struts2. A successful attack can lead to arbitrary code execution.

Extended Description

XWork is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input. Attackers can exploit this issue to manipulate server-side context objects with the privileges of the user running the application. Successful exploits can compromise the application and possibly the underlying computer. This issue is related to the vulnerability documented in BID 32101 (XWork 'ParameterInterceptor' Class OGNL Security Bypass Vulnerability); the implemented solution appears to have been incomplete.

Affected Products

Apache_software_foundation struts

Short Name
HTTP:APACHE:STRUTS2-PI-RCE
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apache CVE-2010-1870 CVE-2011-3923 Command Execution ParametersInterceptor Remote Struts2 bid:41592
Release Date
09/28/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apache_software_foundation

Atlassian

Vmware

Opensymphony

CVSS Score

7.5

5.0

Found a potential security threat?