Search for packages
| purl | pkg:maven/org.apache.struts/struts2-rest-plugin@2.5.10.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-492x-u9pr-auen
Aliases: CVE-2017-9793 GHSA-vwxj-6m5m-rrvh |
DoS attack via crafted XML payload processed by REST Plugin using XStream library The REST Plugin in this package is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload. |
Affected by 6 other vulnerabilities. |
|
VCID-79j9-v8gz-rfax
Aliases: CVE-2020-17530 GHSA-jc35-q369-45pv |
Remote code execution in Apache Struts Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. |
Affected by 3 other vulnerabilities. |
|
VCID-bgbt-j1n9-6yg5
Aliases: CVE-2018-1327 GHSA-38cr-2ph5-frr9 |
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. |
Affected by 4 other vulnerabilities. |
|
VCID-fy9j-w7r2-sugr
Aliases: CVE-2017-15707 GHSA-xcrm-qpp8-hcw4 |
DoS vulnerability The REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload. |
Affected by 5 other vulnerabilities. Affected by 4 other vulnerabilities. |
|
VCID-gfxq-vtry-bqgg
Aliases: CVE-2023-50164 GHSA-2j39-qcjm-428w |
Files or Directories Accessible to External Parties An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-hgj2-vqzn-gyeb
Aliases: CVE-2021-31805 GHSA-v8j6-6c2r-r27c |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation. |
Affected by 2 other vulnerabilities. |
|
VCID-hpm1-euf1-vff1
Aliases: CVE-2023-41835 GHSA-729q-fcgp-r5xh |
Incomplete Cleanup When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied. Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
|
VCID-t1v1-vm43-sfhg
Aliases: CVE-2017-9805 GHSA-gg9m-fj3v-r58c |
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. |
Affected by 6 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||