bw6-plugin-maven icon indicating copy to clipboard operation
bw6-plugin-maven copied to clipboard

CVE-2016-1181 (High) detected in struts-core-1.3.8.jar

Open mend-for-github-com[bot] opened this issue 6 years ago • 0 comments

CVE-2016-1181 - High Severity Vulnerability

Vulnerable Library - struts-core-1.3.8.jar

Apache Struts

Library home page: http://struts.apache.org

Path to dependency file: /Source/bw6-maven-plugin/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts-core/1.3.8/struts-core-1.3.8.jar

Dependency Hierarchy:

  • maven-reporting-impl-3.0.0.jar (Root Library)
    • doxia-site-renderer-1.7.4.jar
      • velocity-tools-2.0.jar
        • :x: struts-core-1.3.8.jar (Vulnerable Library)

Found in HEAD commit: 4d279939679b1227e061ae92cc6c0d7c9250eb08

Found in base branch: master

Vulnerability Details

ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.

Publish Date: 2016-07-04

URL: CVE-2016-1181

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Release Date: 2016-06-08

Fix Resolution: Replace or update the following file: ActionServlet.java