First published: Tue Feb 07 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 1.3.10 allow remote attackers to inject arbitrary web script or HTML via (1) the name parameter to struts-examples/upload/upload-submit.do, or the message parameter to (2) `struts-cookbook/processSimple.do` or (3) `struts-cookbook/processDyna.do`.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/struts:struts | <=1.3.10 | |
maven/org.apache.struts:struts-core | <=1.3.10 | |
Apache Struts 2 | =1.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-1007 is classified as important due to its potential for cross-site scripting attacks.
To fix CVE-2012-1007, upgrade to a newer version of Apache Struts that is not affected, specifically above 1.3.10.
CVE-2012-1007 affects Apache Struts version 1.3.10 and earlier.
CVE-2012-1007 is identified as a cross-site scripting (XSS) vulnerability.
Yes, CVE-2012-1007 can be exploited remotely by attackers through crafted web requests.