CVE-2014-0112

ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
References
Link Resource
http://jvn.jp/en/jp/JVN19294237/index.html Third Party Advisory VDB Entry
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045 Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html Third Party Advisory VDB Entry
http://secunia.com/advisories/59178 Permissions Required
http://secunia.com/advisories/59500 Permissions Required
http://www-01.ibm.com/support/docview.wss?uid=swg21676706 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html Third Party Advisory
http://www.securityfocus.com/archive/1/531952/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/532549/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/67064 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2014-0007.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0910 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1091939 Issue Tracking
https://cwiki.apache.org/confluence/display/WW/S2-021 Patch Vendor Advisory
http://jvn.jp/en/jp/JVN19294237/index.html Third Party Advisory VDB Entry
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045 Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html Third Party Advisory VDB Entry
http://secunia.com/advisories/59178 Permissions Required
http://secunia.com/advisories/59500 Permissions Required
http://www-01.ibm.com/support/docview.wss?uid=swg21676706 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html Third Party Advisory
http://www.securityfocus.com/archive/1/531952/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/532549/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/67064 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2014-0007.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0910 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1091939 Issue Tracking
https://cwiki.apache.org/confluence/display/WW/S2-021 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN19294237/index.html - Third Party Advisory, VDB Entry () http://jvn.jp/en/jp/JVN19294237/index.html - Third Party Advisory, VDB Entry
References () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045 - Third Party Advisory, VDB Entry () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045 - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html - Third Party Advisory, VDB Entry
References () http://secunia.com/advisories/59178 - Permissions Required () http://secunia.com/advisories/59178 - Permissions Required
References () http://secunia.com/advisories/59500 - Permissions Required () http://secunia.com/advisories/59500 - Permissions Required
References () http://www-01.ibm.com/support/docview.wss?uid=swg21676706 - Third Party Advisory () http://www-01.ibm.com/support/docview.wss?uid=swg21676706 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - Third Party Advisory
References () http://www.securityfocus.com/archive/1/531952/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/531952/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/532549/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/532549/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/67064 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67064 - Third Party Advisory, VDB Entry
References () http://www.vmware.com/security/advisories/VMSA-2014-0007.html - Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2014-0007.html - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0910 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0910 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1091939 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1091939 - Issue Tracking
References () https://cwiki.apache.org/confluence/display/WW/S2-021 - Patch, Vendor Advisory () https://cwiki.apache.org/confluence/display/WW/S2-021 - Patch, Vendor Advisory

Information

Published : 2014-04-29 10:37

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0112

Mitre link : CVE-2014-0112

CVE.ORG link : CVE-2014-0112


JSON object : View

Products Affected

apache

  • struts
CWE
CWE-264

Permissions, Privileges, and Access Controls