CVE-2017-9805: REST Plugin in Apache Struts uses an XStreamHandler with an instance of XStream for deserialization without any type filtering
(updated )
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
References
- blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax
- bugzilla.redhat.com/show_bug.cgi?id=1488482
- cwiki.apache.org/confluence/display/WW/S2-052
- github.com/advisories/GHSA-gg9m-fj3v-r58c
- github.com/apache/struts
- github.com/apache/struts/commit/19494718865f2fb7da5ea363de3822f87fbda26
- github.com/apache/struts/commit/6dd6e5cfb7b5e020abffe7e8091bd63fe97c10a
- lgtm.com/blog/apache_struts_CVE-2017-9805
- nvd.nist.gov/vuln/detail/CVE-2017-9805
- security.netapp.com/advisory/ntap-20170907-0001
- struts.apache.org/docs/s2-052.html
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2
- web.archive.org/web/20170909031344/http://www.securityfocus.com/bid/100609
- web.archive.org/web/20170922053119/http://www.securitytracker.com/id/1039263
- www.exploit-db.com/exploits/42627
- www.kb.cert.org/vuls/id/112992
Detect and mitigate CVE-2017-9805 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →