The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
Published 2017-09-15 19:29:00
Updated 2024-07-25 13:40:55
View at NVD,   CVE.org
Vulnerability category: Execute code

Products affected by CVE-2017-9805

CVE-2017-9805 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Apache Struts Deserialization of Untrusted Data Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Apache Struts REST Plugin uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to remote code execution when deserializing XML payloads.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2017-9805
Added on 2021-11-03 Action due date 2022-05-03

Exploit prediction scoring system (EPSS) score for CVE-2017-9805

97.52%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2017-9805

  • Apache Struts 2 REST Plugin XStream RCE
    Disclosure Date: 2017-09-05
    First seen: 2020-04-26
    exploit/multi/http/struts2_rest_xstream
    Apache Struts versions 2.1.2 - 2.3.33 and Struts 2.5 - Struts 2.5.12, using the REST plugin, are vulnerable to a Java deserialization attack in the XStream library. Authors: - Man Yue Mo - wvu <wvu@metasploit.com>

CVSS scores for CVE-2017-9805

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
6.8
MEDIUM AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
NIST
8.1
HIGH CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2.2
5.9
NIST
8.1
HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2.2
5.9
NIST 2024-07-25

CWE ids for CVE-2017-9805

References for CVE-2017-9805

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!