Apache Struts 2 - Remote Code Execution (CVE-2018-11776)
- Severity
- CVSSv3 Score
- 8.1
- Exploitable with Sniper
- Yes
- Vulnerability description
Apache Struts 2 framework is affected by a Remote Code Execution vulnerability, located in the
chain.action
endpoint. The root cause of this vulnerability consists in havingalwaysSelectFullNamespace
flag set in Struts configuration. Therefore, an unauthenticated remote attacker can send HTTP GET requests having OGNL expressions with OS commands included, which will be evaluated by the server.- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware or pivot to the internal network.
- Recommendation
Upgrade the Apache Struts 2 framework to a version equal to or higher than 2.3.35, 2.5.17.
- Detectable with
- Network Scanner
- Vuln date
- Aug 2018
- Published at
- Updated at
- Software Type
- Web framework
- Vendor
- Apache
- Product
- Struts
- Codename
- Not available