Apache Struts - Remote Code Execution (CVE-2020-17530)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Apache Struts server is affected by a Remote Code Execution vulnerability, that an unauthenticated attacker can exploit to execute arbitrary commands on the target server. The root cause of this vulnerability consists in a forced double Object-Graph Navigation Language (OGNL) evaluation vulnerability on raw user-provided input, in tag attributes.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Apache Struts server to 2.5.26 version or later.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Dec 2020
- Published at
- Updated at
- Software Type
- Web framework
- Vendor
- Apache
- Product
- Struts