First published: Sun Jan 08 2012(Updated: )
The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | >=2.1.0<2.3.1.1 | |
maven/org.apache.struts:struts2-core | <2.3.1.1 | 2.3.1.1 |
maven/org.apache.struts.xwork:xwork-core | <2.2.3.1 | 2.2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0393 is classified as a critical vulnerability due to its potential for remote code execution and file manipulation.
To fix CVE-2012-0393, upgrade to Apache Struts version 2.3.1.1 or later, or version 2.2.3.1 or later.
CVE-2012-0393 affects Apache Struts versions prior to 2.3.1.1.
Exploitation of CVE-2012-0393 enables attackers to create or overwrite arbitrary files on the server.
Yes, CVE-2012-0393 is considered easily exploitable by remote attackers due to insufficient parameter validation.