struts:struts@1.2.9 vulnerabilities

  • latest version

    1.2.9

  • first published

    19 years ago

  • latest version published

    18 years ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the struts:struts package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

struts:struts is a part of the Struts framework.

Affected versions of this package are vulnerable to Arbitrary Code Execution where the class property is not suppressed. It allows remote attackers to "manipulate" the ClassLoader and to execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Note: Struts1 has been deprecated. Users should use Struts2 which is not vulnerable to this issue.

How to fix Arbitrary Code Execution?

There is no fixed version for struts:struts.

[0,)
  • H
Denial of Service (DoS)

struts:struts ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.

[1.0.2,)
  • H
Improper Input Validation

struts:struts ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.

[1.0.2,)
  • H
Improper Input Validation

struts:struts The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.

[1,1.3.0)