header-logo
Suggest Exploit
vendor:
Struts
by:
SecurityFocus
7.5
CVSS
HIGH
Security-Bypass
20
CWE
Product Name: Struts
Affected Version From: XWork prior to 2.0.6
Affected Version To: Struts 2.0.0 through 2.0.11.2
Patch Exists: YES
Related CWE: N/A
CPE: o:apache:struts:2.0.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

XWork Security-Bypass Vulnerability

XWork is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input. Attackers can exploit this issue to manipulate server-side context objects with the privileges of the user running the application. Successful exploits can compromise the application and possibly the underlying computer.

Mitigation:

Upgrade to XWork 2.0.6 or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/32101/info

XWork is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input.

Attackers can exploit this issue to manipulate server-side context objects with the privileges of the user running the application. Successful exploits can compromise the application and possibly the underlying computer.

Versions prior to XWork 2.0.6 are vulnerable. Struts 2.0.0 through 2.0.11.2 contain vulnerable versions of XWorks and are therefore also affected. 

To set #session.user to '0wn3d':

('\u0023' + 'session[\'user\']')(unused)=0wn3d