Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cnvd-2017-02474
Vulnerability from cnvd
Title: Apache Struts2存在S2-045远程代码执行漏洞
Description:
Apache Struts是一款用于创建企业级Java Web应用的开源框架。
Apache Struts2存在S2-045远程代码执行漏洞。远程攻击者利用该漏洞可直接取得网站服务器控制权。
Severity: 高
Patch Name: Apache Struts2存在S2-045远程代码执行漏洞的补丁
Patch Description:
Apache Struts是一款用于创建企业级Java Web应用的开源框架。
Apache Struts2存在S2-045远程代码执行漏洞。远程攻击者利用该漏洞可直接取得网站服务器控制权。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
Apache Struts官方已在发布的新的版本中修复了该漏洞。建议使用Jakarta Multipart parser模块的用户升级到Apache Struts版本2.3.32或2.5.10.1: https://cwiki.apache.org/confluence/display/WW/S2-045
Reference: https://cwiki.apache.org/confluence/display/WW/S2-045 http://0day5.com/archives/4334/
Impacted products
Name | ['Apache struts >=2.3.5,<=2.3.31', 'Apache struts >=2.5,<=2.5.10'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2017-5638" } }, "description": "Apache Struts\u662f\u4e00\u6b3e\u7528\u4e8e\u521b\u5efa\u4f01\u4e1a\u7ea7Java Web\u5e94\u7528\u7684\u5f00\u6e90\u6846\u67b6\u3002\r\n\r\nApache Struts2\u5b58\u5728S2-045\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u76f4\u63a5\u53d6\u5f97\u7f51\u7ad9\u670d\u52a1\u5668\u63a7\u5236\u6743\u3002", "discovererName": "nike.zheng", "formalWay": "Apache Struts\u5b98\u65b9\u5df2\u5728\u53d1\u5e03\u7684\u65b0\u7684\u7248\u672c\u4e2d\u4fee\u590d\u4e86\u8be5\u6f0f\u6d1e\u3002\u5efa\u8bae\u4f7f\u7528Jakarta Multipart parser\u6a21\u5757\u7684\u7528\u6237\u5347\u7ea7\u5230Apache Struts\u7248\u672c2.3.32\u62162.5.10.1\uff1a\r\nhttps://cwiki.apache.org/confluence/display/WW/S2-045", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-02474", "openTime": "2017-03-07", "patchDescription": "Apache Struts\u662f\u4e00\u6b3e\u7528\u4e8e\u521b\u5efa\u4f01\u4e1a\u7ea7Java Web\u5e94\u7528\u7684\u5f00\u6e90\u6846\u67b6\u3002\r\n\r\nApache Struts2\u5b58\u5728S2-045\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u76f4\u63a5\u53d6\u5f97\u7f51\u7ad9\u670d\u52a1\u5668\u63a7\u5236\u6743\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apache Struts2\u5b58\u5728S2-045\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Apache struts \u003e=2.3.5\uff0c\u003c=2.3.31", "Apache struts \u003e=2.5\uff0c\u003c=2.5.10" ] }, "referenceLink": "https://cwiki.apache.org/confluence/display/WW/S2-045\r\nhttp://0day5.com/archives/4334/", "serverity": "\u9ad8", "submitTime": "2017-03-07", "title": "Apache Struts2\u5b58\u5728S2-045\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e" }
CVE-2017-5638 (GCVE-0-2017-5638)
Vulnerability from cvelistv5
Published
2017-03-11 02:11
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Struts |
Version: 2.3.x before 2.3.32 Version: 2.5.x before 2.5.10.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:04:15.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "name": "41570", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://exploit-db.com/exploits/41570" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-046.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "name": "VU#834067", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/834067" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://isc.sans.edu/diary/22169" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://struts.apache.org/docs/s2-045.html" }, { "name": "1037973", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037973" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "name": "96729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96729" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/theog150/status/841146956135124993" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mazen160/struts-pwn" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "name": "41614", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41614/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-5638", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T21:06:33.860690Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5638" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:32.059Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2021-11-03T00:00:00+00:00", "value": "CVE-2017-5638 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache Struts", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "2.3.x before 2.3.32" }, { "status": "affected", "version": "2.5.x before 2.5.10.1" } ] } ], "datePublic": "2017-03-06T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-24T03:06:34.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "name": "41570", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://exploit-db.com/exploits/41570" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-046.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "name": "VU#834067", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/834067" }, { "tags": [ "x_refsource_MISC" ], "url": "https://isc.sans.edu/diary/22169" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://struts.apache.org/docs/s2-045.html" }, { "name": "1037973", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037973" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "name": "96729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96729" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/theog150/status/841146956135124993" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mazen160/struts-pwn" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "name": "41614", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41614/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5638", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Struts", "version": { "version_data": [ { "version_value": "2.3.x before 2.3.32" }, { "version_value": "2.5.x before 2.5.10.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html", "refsource": "MISC", "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt" }, { "name": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/", "refsource": "MISC", "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "name": "41570", "refsource": "EXPLOIT-DB", "url": "https://exploit-db.com/exploits/41570" }, { "name": "https://security.netapp.com/advisory/ntap-20170310-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "name": "https://github.com/rapid7/metasploit-framework/issues/8064", "refsource": "MISC", "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "name": "https://struts.apache.org/docs/s2-046.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-046.html" }, { "name": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html", "refsource": "MISC", "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "name": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/", "refsource": "MISC", "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03733en_us" }, { "name": "VU#834067", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/834067" }, { "name": "https://isc.sans.edu/diary/22169", "refsource": "MISC", "url": "https://isc.sans.edu/diary/22169" }, { "name": "https://struts.apache.org/docs/s2-045.html", "refsource": "CONFIRM", "url": "https://struts.apache.org/docs/s2-045.html" }, { "name": "1037973", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037973" }, { "name": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html", "refsource": "MISC", "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "name": "96729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96729" }, { "name": "https://twitter.com/theog150/status/841146956135124993", "refsource": "MISC", "url": "https://twitter.com/theog150/status/841146956135124993" }, { "name": "https://github.com/mazen160/struts-pwn", "refsource": "MISC", "url": "https://github.com/mazen160/struts-pwn" }, { "name": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt" }, { "name": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145", "refsource": "CONFIRM", "url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA145" }, { "name": "https://support.lenovo.com/us/en/product_security/len-14200", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "name": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a", "refsource": "CONFIRM", "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03723en_us" }, { "name": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228", "refsource": "CONFIRM", "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-045", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-045" }, { "name": "41614", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41614/" }, { "name": "https://cwiki.apache.org/confluence/display/WW/S2-046", "refsource": "CONFIRM", "url": "https://cwiki.apache.org/confluence/display/WW/S2-046" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03749en_us" }, { "name": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/", "refsource": "MISC", "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210125 Apache Software Foundation Security Report: 2020", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E" }, { "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-5638", "datePublished": "2017-03-11T02:11:00.000Z", "dateReserved": "2017-01-29T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:32.059Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…