ID CVE-2016-1181
Summary ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:banking_platform:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:banking_platform:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:portal:11.1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:portal:11.1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 23-04-2019 - 19:29)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid
  • 91068
  • 91787
confirm
jvn JVN#03188560
jvndb JVNDB-2016-000096
misc https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
sectrack 1036056
Last major update 23-04-2019 - 19:29
Published 04-07-2016 - 22:59
Last modified 15-07-2020 - 03:15
Back to Top