CVE-2017-15707
Published on: 12/01/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:26:33 PM UTC
Certain versions of Struts from Apache contain the following vulnerability:
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
- CVE-2017-15707 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache Struts version 2.5 to 2.5.14
CVSS3 Score: 6.2 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Apache Struts REST Plugin JSON Library Bug Lets Remote Users Deny Service - SecurityTracker | Third Party Advisory VDB Entry www.securitytracker.com text/html |
![]() |
Apache Struts CVE-2017-15707 Denial of Service Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
CPU July 2018 | Patch www.oracle.com text/html |
![]() |
Oracle Critical Patch Update - April 2018 | Patch www.oracle.com text/html |
![]() |
S2-054 - Apache Struts 2 Documentation - Apache Software Foundation | Patch Vendor Advisory cwiki.apache.org text/html |
![]() |
CVE-2017-15707 Apache Struts Vulnerability in NetApp Products | NetApp Product Security | Third Party Advisory security.netapp.com text/html |
![]() |
Related QID Numbers
- 980793 Java (maven) Security Update for org.apache.struts:struts2-rest-plugin (GHSA-xcrm-qpp8-hcw4)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:agile_plm_framework:9.3.6:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:agile_plm_framework:9.3.6:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.4:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.4:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:global_lifecycle_management_opatchauto:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:global_lifecycle_management_opatchauto:*:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:6.5.11:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0.6:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1.6:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:6.5.11:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0.6:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1.6:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:webcenter_portal:12.2.1.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:webcenter_portal:12.2.1.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:weblogic_server:12.2.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:weblogic_server:12.2.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE