First published: Wed Sep 20 2017(Updated: )
In Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side. This vulnerability is only exploitable when using the Struts 2 Convention plugin in conjunction with Apache Struts.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-convention-plugin | >=2.5.0<2.5.5 | 2.5.5 |
maven/org.apache.struts:struts2-convention-plugin | >=2.3.0<2.3.31 | 2.3.31 |
=2.3.20 | ||
=2.3.20.1 | ||
=2.3.20.2 | ||
=2.3.20.3 | ||
=2.3.21 | ||
=2.3.22 | ||
=2.3.23 | ||
=2.3.24 | ||
=2.3.24.1 | ||
=2.3.24.2 | ||
=2.3.24.3 | ||
=2.3.25 | ||
=2.3.26 | ||
=2.3.27 | ||
=2.3.28 | ||
=2.3.28.1 | ||
=2.3.29 | ||
=2.3.30 | ||
Apache Struts | =2.3.20 | |
Apache Struts | =2.3.20.1 | |
Apache Struts | =2.3.20.2 | |
Apache Struts | =2.3.20.3 | |
Apache Struts | =2.3.21 | |
Apache Struts | =2.3.22 | |
Apache Struts | =2.3.23 | |
Apache Struts | =2.3.24 | |
Apache Struts | =2.3.24.1 | |
Apache Struts | =2.3.24.2 | |
Apache Struts | =2.3.24.3 | |
Apache Struts | =2.3.25 | |
Apache Struts | =2.3.26 | |
Apache Struts | =2.3.27 | |
Apache Struts | =2.3.28 | |
Apache Struts | =2.3.28.1 | |
Apache Struts | =2.3.29 | |
Apache Struts | =2.3.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6795 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2016-6795, upgrade to Apache Struts 2.5.5 or 2.3.31 or later versions.
CVE-2016-6795 affects Apache Struts versions 2.3.x before 2.3.31 and 2.5.x before 2.5.5.
No, CVE-2016-6795 is only exploitable when the Struts 2 Convention plugin is in use.
Exploitation of CVE-2016-6795 can lead to path traversal and execution of arbitrary code on the server.