First published: Sun Jan 08 2012(Updated: )
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts.xwork:xwork-core | <2.2.3.1 | 2.2.3.1 |
maven/org.apache.struts:struts2-core | <2.2.3.1 | 2.2.3.1 |
Apache Struts 2 | >=2.0.0<2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0392 has a high severity rating due to its potential to allow remote command execution.
To address CVE-2012-0392, upgrade Apache Struts to version 2.3.1.1 or later.
CVE-2012-0392 affects the CookieInterceptor component in Apache Struts versions before 2.3.1.1.
CVE-2012-0392 allows remote attackers to execute arbitrary commands through a crafted HTTP Cookie header.
There is no known workaround for CVE-2012-0392, so upgrading to a fixed version is recommended.