First published: Thu Apr 09 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.x before 2.0.11.1 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via vectors associated with improper handling of (1) " (double quote) characters in the href attribute of an s:a tag and (2) parameters in the action attribute of an s:url tag.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-core | >=2.1.0<2.1.1 | 2.1.1 |
maven/org.apache.struts:struts2-core | >=2.0.0<2.0.11.1 | 2.0.11.1 |
Apache Struts 2 | =2.0.6 | |
Apache Struts 2 | =2.0.8 | |
Apache Struts 2 | =2.0.9 | |
Apache Struts 2 | =2.0.11 | |
Apache Struts 2 | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6682 has a medium severity rating due to the presence of multiple cross-site scripting vulnerabilities.
To mitigate CVE-2008-6682, upgrade Apache Struts to version 2.0.11.1 or 2.1.1 or higher.
CVE-2008-6682 affects Apache Struts versions 2.0.6, 2.0.8, 2.0.9, and all 2.1.x versions prior to 2.1.1.
CVE-2008-6682 allows remote attackers to perform cross-site scripting attacks through the improper handling of HTML and script injection.
While specific exploits for CVE-2008-6682 may exist, they are typically not publicly disclosed to prevent abuse.