Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-9805 | First vendor Publication | 2017-09-15 |
Vendor | Cve | Last vendor Modification | 2025-03-06 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.1 | ||
Base Score | 8.1 | Environmental Score | 8.1 |
impact SubScore | 5.9 | Temporal Score | 8.1 |
Exploitabality Sub Score | 2.2 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9805 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-502 | Deserialization of Untrusted Data |
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Apache Struts REST plugin XStream deserialization vulnerability | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2017-10-10 | Java XML deserialization remote code execution attempt RuleID : 44315 - Revision : 3 - Type : SERVER-WEBAPP |
Metasploit Database
id | Description |
---|---|
2017-09-05 | Apache Struts 2 REST Plugin XStream RCE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-09-28 | Name : A web application running on the remote host is affected by a denial of servi... File : mysql_enterprise_monitor_3_4_3_4225.nasl - Type : ACT_GATHER_INFO |
2017-09-06 | Name : The remote web server contains a web application that uses a Java framework t... File : struts_2_5_13_rest_rce.nasl - Type : ACT_ATTACK |
2017-09-05 | Name : A web application running on the remote host uses a Java framework that is af... File : struts_2_5_13.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-03-07 00:21:12 |
|
2025-02-07 00:21:33 |
|
2025-01-23 21:20:58 |
|
2024-11-28 13:10:17 |
|
2024-07-25 17:27:43 |
|
2021-05-04 13:06:15 |
|
2021-04-22 02:19:54 |
|
2020-05-23 13:17:10 |
|
2020-05-23 01:04:51 |
|
2019-08-13 05:19:36 |
|
2017-11-10 09:23:13 |
|
2017-10-31 09:22:07 |
|
2017-10-04 17:23:18 |
|
2017-09-29 17:23:40 |
|
2017-09-29 13:24:53 |
|
2017-09-28 09:23:03 |
|
2017-09-22 09:24:20 |
|
2017-09-17 09:23:37 |
|
2017-09-16 00:23:46 |
|