First published: Fri Nov 01 2019(Updated: )
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | >=2.0.0<2.3.1.2 | |
Redhat Jboss Enterprise Web Server | =1.0.0 | |
maven/org.apache.struts:struts2-core | >=2.0.0<2.3.1.2 | 2.3.1.2 |
debian/libstruts1.2-java |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3923 is a vulnerability in Apache Struts before 2.3.1.2 that allows remote attackers to bypass security protections in the ParameterInterceptor.
CVE-2011-3923 has a severity level of 9, which is considered critical.
CVE-2011-3923 affects Apache Struts versions prior to 2.3.1.2 and Redhat Jboss Enterprise Web Server 1.0.0.
To fix CVE-2011-3923, update Apache Struts to version 2.3.1.2 or later.
You can find more information about CVE-2011-3923 [here](https://cwiki.apache.org/confluence/display/WW/S2-009), [here](http://blog.o0o.nu/2012/01/cve-2011-3923-yet-another-struts2.html), and [here](http://seclists.org/fulldisclosure/2014/Jul/38).