SB2017090720 - Remote code execution in Apache Struts
Published: September 7, 2017 Updated: September 11, 2017
Security Bulletin ID
SB2017090720
Severity
High
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Deserialization of untrusted data (CVE-ID: CVE-2017-9805)
The vulnerability allows a remote attacker to execute arbitrary code on the server.The weakness exists due to absent filtration in XStream instance when deserializing XML data within the REST Plugin. A remote attacker can upload a specially crafted XML file to vulnerable Apache Struts installation, trigger the XStreamHandler to process malicious XML payload and execute arbitrary core on the target system.
Successful exploitation of the vulnerability is possible in case the attacker is able to upload XML.
Remediation
Install update from vendor's website.