Rapid7 VulnDB

Apache Struts: CVE-2014-0114: Arbitrary code execution

Back to Search

Apache Struts: CVE-2014-0114: Arbitrary code execution

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
04/30/2014
Created
07/25/2018
Added
06/27/2017
Modified
09/14/2018

Description

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Solution(s)

  • struts-cve-2014-0114-1

References

  • struts-cve-2014-0114-1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;