CVE-2016-4438

The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*

History

21 Nov 2024, 02:52

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN07710476/index.html - Vendor Advisory () http://jvn.jp/en/jp/JVN07710476/index.html - Vendor Advisory
References () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110 - VDB Entry, Vendor Advisory () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110 - VDB Entry, Vendor Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -
References () http://www.securityfocus.com/bid/91275 - Third Party Advisory () http://www.securityfocus.com/bid/91275 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1348238 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1348238 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://struts.apache.org/docs/s2-037.html - Vendor Advisory () https://struts.apache.org/docs/s2-037.html - Vendor Advisory

Information

Published : 2016-07-04 22:59

Updated : 2024-11-21 02:52


NVD link : CVE-2016-4438

Mitre link : CVE-2016-4438

CVE.ORG link : CVE-2016-4438


JSON object : View

Products Affected

apache

  • struts
CWE
CWE-20

Improper Input Validation