{"api_version":"1","generated_at":"2026-04-22T22:48:57+00:00","cve":"CVE-2006-1547","urls":{"html":"https://cve.report/CVE-2006-1547","api":"https://cve.report/api/cve/CVE-2006-1547.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-1547","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-1547"},"summary":{"title":"CVE-2006-1547","description":"ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.","state":"PUBLISHED","assigner":"redhat","published_at":"2006-03-30 22:02:00","updated_at":"2026-04-16 14:02:43"},"problem_types":["NVD-CWE-Other","CWE-749","n/a","CWE-749 CWE-749 Exposed Dangerous Method or Function"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://secunia.com/advisories/19493","name":"http://secunia.com/advisories/19493","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Struts Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://issues.apache.org/bugzilla/show_bug.cgi?id=38534","name":"http://issues.apache.org/bugzilla/show_bug.cgi?id=38534","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Permissions Required"],"title":"Missing Bug ID","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1015856","name":"http://securitytracker.com/id?1015856","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityTracker.com Archives - Struts Bugs May Let Remote Users Bypass Validation, Conduct Cross-Site Scripting Attacks, and Deny Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20117","name":"http://secunia.com/advisories/20117","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"SUSE Updates for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html","name":"http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"SuSE Security announcements: [suse-security-announce] SUSE Security Summary Report SUSE-SR:2006:010","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html","name":"http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit","Patch","Vendor Advisory"],"title":"Struts Release Notes (since 1.2.8)","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1205","name":"http://www.vupen.com/english/advisories/2006/1205","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"inode/x-empty","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2006-1547","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2006-1547","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25613","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25613","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/17342","name":"http://www.securityfocus.com/bid/17342","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Apache Struts Multiple Remote Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-1547","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-1547","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[{"source":"ADP","time":"2022-01-21T00:00:00.000Z","lang":"en","value":"CVE-2006-1547 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"1547","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"commons_beanutils","cpe6":"1.7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1547","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"struts","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2006","cve_id":"1547","cve":"CVE-2006-1547","vendorProject":"Apache","product":"Struts 1","vulnerabilityName":"Apache Struts 1 ActionForm Denial-of-Service Vulnerability","dateAdded":"2022-01-21","shortDescription":"ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS).","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-07-21","knownRansomwareCampaignUse":"Unknown","notes":"https://nvd.nist.gov/vuln/detail/CVE-2006-1547","cwes":"","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:11"},"epss":{"cve_year":"2006","cve_id":"1547","cve":"CVE-2006-1547","epss":"0.221920000","percentile":"0.958190000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:41"},"legacy_qids":[{"cve":"CVE-2006-1547","qid":"376432","title":"Apache Struts Denial of Service (DoS) Vulnerability"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:19:48.247Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1015856","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015856"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html"},{"name":"ADV-2006-1205","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1205"},{"name":"17342","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/17342"},{"name":"19493","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19493"},{"name":"struts-actionform-dos(25613)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25613"},{"name":"SUSE-SR:2006:010","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"},{"name":"20117","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20117"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://issues.apache.org/bugzilla/show_bug.cgi?id=38534"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2006-1547","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-02-07T13:35:54.338056Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2022-01-21","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2006-1547"},"type":"kev"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-749","description":"CWE-749 Exposed Dangerous Method or Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2025-10-22T00:05:56.875Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2006-1547"}],"timeline":[{"lang":"en","time":"2022-01-21T00:00:00.000Z","value":"CVE-2006-1547 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-03-30T00:00:00.000Z","descriptions":[{"lang":"en","value":"ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-19T15:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"1015856","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015856"},{"tags":["x_refsource_CONFIRM"],"url":"http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html"},{"name":"ADV-2006-1205","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1205"},{"name":"17342","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/17342"},{"name":"19493","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19493"},{"name":"struts-actionform-dos(25613)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25613"},{"name":"SUSE-SR:2006:010","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"},{"name":"20117","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20117"},{"tags":["x_refsource_CONFIRM"],"url":"http://issues.apache.org/bugzilla/show_bug.cgi?id=38534"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-1547","datePublished":"2006-03-30T22:00:00.000Z","dateReserved":"2006-03-30T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:56.875Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-03-30 22:02:00","lastModifiedDate":"2026-04-16 14:02:43","problem_types":["NVD-CWE-Other","CWE-749","n/a","CWE-749 CWE-749 Exposed Dangerous Method or Function"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.9","matchCriteriaId":"B108ED90-C4AA-496F-B3C7-4AA392564C1F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:apache:commons_beanutils:1.7.0:*:*:*:*:*:*:*","matchCriteriaId":"A7987ADF-7D37-4D26-BA04-B4279082F327"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"1547","Ordinal":"1","Title":"CVE-2006-1547","CVE":"CVE-2006-1547","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"1547","Ordinal":"1","NoteData":"ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.","Type":"Description","Title":"CVE-2006-1547"},{"CveYear":"2006","CveId":"1547","Ordinal":"2","NoteData":"2006-03-30","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"1547","Ordinal":"3","NoteData":"2017-07-19","Type":"Other","Title":"Modified"}]}}}