CVE-2013-2251 Scanner
CVE-2013-2251 scanner - Code Execution vulnerability in Apache Software Foundation Struts
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 seconds
Time Interval
4 weeks
Scan only one
URL
Toolbox
-
Apache Struts is a popular open-source framework used for building web applications in Java. It is widely used by developers due to its simplicity and flexibility, as it provides numerous tools and features to create complex web applications quickly. Struts allows users to create dynamic and responsive web pages, which are critical for modern-day applications. This software is highly customizable, and users can choose to use only the components they need for their projects, making it an efficient option for developers.
CVE-2013-2251 is a vulnerability discovered in Apache Struts 2.0.0 through 2.3.15. This vulnerability allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted action, redirect, or redirectAction prefix. OGNL (Object-Graph Navigation Language) is a powerful expression language that can be used to manipulate Java Objects and is used extensively in Apache Struts. The vulnerability can be exploited by an attacker remotely, without the need for any privileged access, making it highly dangerous.
The exploitation of the CVE-2013-2251 vulnerability can lead to serious consequences. Attackers can execute arbitrary system commands or steal sensitive data, such as usernames, passwords, and other valuable information. This breach in security can compromise the entire web application and cause irreversible damage to the business. Furthermore, if the vulnerability is not patched on time, the attacker can continue exploiting it for an extended period without being detected.
Thanks to the pro features of the s4e.io platform, users can easily and quickly learn about vulnerabilities in their digital assets. The platform offers comprehensive tools for web application security, including vulnerability scanning, compliance testing, and penetration testing. By using this platform, users can rest assured that their applications are secure and that any detected vulnerabilities are addressed promptly.
REFERENCES
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- exchange.xforce.ibmcloud.com: apache-archiva-ognl-command-exec(90392)
- seclists.org: 20131013 Apache Software Foundation A Subsite Remote command execution
- http://cxsecurity.com/issue/WLB-2014010087
- tools.cisco.com: 20131023 Apache Struts 2 Command Execution Vulnerability in Multiple Cisco Products
- http://struts.apache.org/release/2.3.x/docs/s2-016.html
- http://archiva.apache.org/security.html
- osvdb.org: 98445
- securitytracker.com: 1032916
- securityfocus.com: 61189
- securitytracker.com: 1029184
- securityfocus.com: 64758
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- seclists.org: [oss-security] 20140114 Re: CVE Request: Apache Archiva Remote Command Execution 0day
- http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html