CVE-2016-0785

Published on: 04/12/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Struts from Apache contain the following vulnerability:

Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.

  • CVE-2016-0785 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 9 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
S2-029 Vendor Advisory
struts.apache.org
text/html
URL Logo CONFIRM struts.apache.org/docs/s2-029.html
Apache Struts CVE-2016-0785 Remote Code Execution Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 85066
Apache Struts Double OGNL Evaluation Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1035271

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheStrutsAllAllAllAll
ApplicationApacheStrutsAllAllAllAll
ApplicationApacheStrutsAllAllAllAll
  • cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*: