First published: Tue Jun 07 2016(Updated: )
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ognl Project Ognl | <=3.0.11 | |
Apache Struts | =2.0.0 | |
Apache Struts | =2.0.1 | |
Apache Struts | =2.0.2 | |
Apache Struts | =2.0.3 | |
Apache Struts | =2.0.4 | |
Apache Struts | =2.0.5 | |
Apache Struts | =2.0.6 | |
Apache Struts | =2.0.7 | |
Apache Struts | =2.0.8 | |
Apache Struts | =2.0.9 | |
Apache Struts | =2.0.10 | |
Apache Struts | =2.0.11 | |
Apache Struts | =2.0.11.1 | |
Apache Struts | =2.0.11.2 | |
Apache Struts | =2.0.12 | |
Apache Struts | =2.0.13 | |
Apache Struts | =2.0.14 | |
Apache Struts | =2.1.0 | |
Apache Struts | =2.1.1 | |
Apache Struts | =2.1.2 | |
Apache Struts | =2.1.3 | |
Apache Struts | =2.1.4 | |
Apache Struts | =2.1.5 | |
Apache Struts | =2.1.6 | |
Apache Struts | =2.1.8 | |
Apache Struts | =2.1.8.1 | |
Apache Struts | =2.2.1 | |
Apache Struts | =2.2.1.1 | |
Apache Struts | =2.2.3 | |
Apache Struts | =2.2.3.1 | |
Apache Struts | =2.3.1 | |
Apache Struts | =2.3.1.1 | |
Apache Struts | =2.3.1.2 | |
Apache Struts | =2.3.4 | |
Apache Struts | =2.3.4.1 | |
Apache Struts | =2.3.7 | |
Apache Struts | =2.3.8 | |
Apache Struts | =2.3.12 | |
Apache Struts | =2.3.14 | |
Apache Struts | =2.3.14.1 | |
Apache Struts | =2.3.14.2 | |
Apache Struts | =2.3.14.3 | |
Apache Struts | =2.3.15 | |
Apache Struts | =2.3.15.1 | |
Apache Struts | =2.3.15.2 | |
Apache Struts | =2.3.15.3 | |
Apache Struts | =2.3.16 | |
Apache Struts | =2.3.16.1 | |
Apache Struts | =2.3.16.2 | |
Apache Struts | =2.3.16.3 | |
Apache Struts | =2.3.20 | |
Apache Struts | =2.3.20.1 | |
Apache Struts | =2.3.20.3 | |
Apache Struts | =2.3.24 | |
Apache Struts | =2.3.24.1 | |
maven/ognl:ognl | <3.0.12 | 3.0.12 |
maven/org.apache.struts:struts2-core | >=2.0.0<=2.3.24.1 | 2.3.24.3 |
All of | ||
Ognl Project Ognl | <=3.0.11 | |
Any of | ||
Apache Struts | =2.0.0 | |
Apache Struts | =2.0.1 | |
Apache Struts | =2.0.2 | |
Apache Struts | =2.0.3 | |
Apache Struts | =2.0.4 | |
Apache Struts | =2.0.5 | |
Apache Struts | =2.0.6 | |
Apache Struts | =2.0.7 | |
Apache Struts | =2.0.8 | |
Apache Struts | =2.0.9 | |
Apache Struts | =2.0.10 | |
Apache Struts | =2.0.11 | |
Apache Struts | =2.0.11.1 | |
Apache Struts | =2.0.11.2 | |
Apache Struts | =2.0.12 | |
Apache Struts | =2.0.13 | |
Apache Struts | =2.0.14 | |
Apache Struts | =2.1.0 | |
Apache Struts | =2.1.1 | |
Apache Struts | =2.1.2 | |
Apache Struts | =2.1.3 | |
Apache Struts | =2.1.4 | |
Apache Struts | =2.1.5 | |
Apache Struts | =2.1.6 | |
Apache Struts | =2.1.8 | |
Apache Struts | =2.1.8.1 | |
Apache Struts | =2.2.1 | |
Apache Struts | =2.2.1.1 | |
Apache Struts | =2.2.3 | |
Apache Struts | =2.2.3.1 | |
Apache Struts | =2.3.1 | |
Apache Struts | =2.3.1.1 | |
Apache Struts | =2.3.1.2 | |
Apache Struts | =2.3.4 | |
Apache Struts | =2.3.4.1 | |
Apache Struts | =2.3.7 | |
Apache Struts | =2.3.8 | |
Apache Struts | =2.3.12 | |
Apache Struts | =2.3.14 | |
Apache Struts | =2.3.14.1 | |
Apache Struts | =2.3.14.2 | |
Apache Struts | =2.3.14.3 | |
Apache Struts | =2.3.15 | |
Apache Struts | =2.3.15.1 | |
Apache Struts | =2.3.15.2 | |
Apache Struts | =2.3.15.3 | |
Apache Struts | =2.3.16 | |
Apache Struts | =2.3.16.1 | |
Apache Struts | =2.3.16.2 | |
Apache Struts | =2.3.16.3 | |
Apache Struts | =2.3.20 | |
Apache Struts | =2.3.20.1 | |
Apache Struts | =2.3.20.3 | |
Apache Struts | =2.3.24 | |
Apache Struts | =2.3.24.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3093 has a medium severity rating due to its potential to cause denial of service.
To fix CVE-2016-3093, upgrade to OGNL version 3.0.12 or later and Struts version 2.3.24.3 or later.
CVE-2016-3093 affects Apache Struts versions from 2.0.0 to 2.3.24.1 and OGNL versions up to 3.0.11.
CVE-2016-3093 is categorized as a denial of service vulnerability.
Yes, CVE-2016-3093 can be exploited remotely by attackers to block access to a website.