CVE-2016-4438

Published on: 07/04/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Struts from Apache contain the following vulnerability:

The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.

  • CVE-2016-4438 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Apache Struts CVE-2016-4438 Remote Code Execution Vulnerability Third Party Advisory
cve.report (archive)
text/html
URL Logo BID 91275
JVN#07710476: Apache Struts 2 vulnerable to remote code execution Vendor Advisory
jvn.jp
text/xml
URL Logo JVN JVN#07710476
No Description Provided VDB Entry
Vendor Advisory
jvndb.jvn.jp
text/html
URL Logo JVNDB JVNDB-2016-000110
S2-037 Vendor Advisory
struts.apache.org
text/html
URL Logo CONFIRM struts.apache.org/docs/s2-037.html
1348238 – (CVE-2016-4438) CVE-2016-4438 struts: Possible RCE via REST plugin Issue Tracking
Third Party Advisory
VDB Entry
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1348238
Oracle Critical Patch Update - July 2017 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheStruts2.3.20AllAllAll
ApplicationApacheStruts2.3.20.1AllAllAll
ApplicationApacheStruts2.3.20.3AllAllAll
ApplicationApacheStruts2.3.24AllAllAll
ApplicationApacheStruts2.3.24.1AllAllAll
ApplicationApacheStruts2.3.24.3AllAllAll
ApplicationApacheStruts2.3.28AllAllAll
ApplicationApacheStruts2.3.20AllAllAll
ApplicationApacheStruts2.3.20.1AllAllAll
ApplicationApacheStruts2.3.20.3AllAllAll
ApplicationApacheStruts2.3.24AllAllAll
ApplicationApacheStruts2.3.24.1AllAllAll
ApplicationApacheStruts2.3.24.3AllAllAll
ApplicationApacheStruts2.3.28AllAllAll
  • cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*: