Vulnerability Details : CVE-2018-11776
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.
Vulnerability category: Input validationExecute code
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2018-11776
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Apache Struts Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Apache Struts contains a vulnerability which allows for remote code execution under two circumstances. One, where the alwaysSelectFullNamespace option is true and the value isn't set for a result defined in underlying configurations and in same time, its upper package configuration have no or wildca
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2018-11776
Probability of exploitation activity in the next 30 days: 97.56%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2018-11776
-
Apache Struts 2 Namespace Redirect OGNL Injection
Disclosure Date : 2018-08-22exploit/multi/http/struts2_namespace_ognlThis module exploits a remote code execution vulnerability in Apache Struts version 2.3 - 2.3.4, and 2.5 - 2.5.16. Remote Code Execution can be performed via an endpoint that makes use of a redirect action. Note that this exploit is dependant on the version of Tomcat running on the target. Versions of Tomcat starting with 7.0.88 currently don't support payloads larger than ~7.5kb. Windows Meterpreter sessions on Tomcat >=7.0.88 are currently not supported. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk. Authors: - Man Yue Mo - hook-s3c - asoto-r7 - wvu <[email protected]>
CVSS scores for CVE-2018-11776
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
[email protected] |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
[email protected] |
CWE ids for CVE-2018-11776
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: [email protected] (Primary)
References for CVE-2018-11776
- https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Patch;Third Party Advisory
-
https://www.exploit-db.com/exploits/45367/
Exploit;Third Party Advisory;VDB Entry
- https://www.oracle.com/security-alerts/cpujul2020.html
-
https://cwiki.apache.org/confluence/display/WW/S2-057
Issue Tracking;Third Party Advisory
-
https://www.exploit-db.com/exploits/45262/
Exploit;Third Party Advisory;VDB Entry
-
https://security.netapp.com/advisory/ntap-20180822-0001/
Third Party Advisory
-
http://www.securitytracker.com/id/1041888
Third Party Advisory;VDB Entry
-
https://lgtm.com/blog/apache_struts_CVE-2018-11776
Exploit;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20181018-0002/
Third Party Advisory
-
http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html
-
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/105125
Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/45260/
Exploit;Third Party Advisory;VDB Entry
-
https://github.com/hook-s3c/CVE-2018-11776-Python-PoC
Exploit;Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html
Patch;Third Party Advisory
-
http://www.securitytracker.com/id/1041547
Third Party Advisory;VDB Entry
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012
Third Party Advisory
-
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt
Mailing List;Third Party Advisory
Products affected by CVE-2018-11776
- cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*