First published: Wed Sep 20 2017(Updated: )
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-core | >=2.5.0<=2.5.10.1 | 2.5.11 |
maven/org.apache.struts:struts2-core | >=2.0.1<=2.3.33 | 2.3.34 |
Apache Struts 2 | =2.0.1 | |
Apache Struts 2 | =2.0.2 | |
Apache Struts 2 | =2.0.3 | |
Apache Struts 2 | =2.0.4 | |
Apache Struts 2 | =2.0.5 | |
Apache Struts 2 | =2.0.6 | |
Apache Struts 2 | =2.0.7 | |
Apache Struts 2 | =2.0.8 | |
Apache Struts 2 | =2.0.9 | |
Apache Struts 2 | =2.0.10 | |
Apache Struts 2 | =2.0.11 | |
Apache Struts 2 | =2.0.11.1 | |
Apache Struts 2 | =2.0.11.2 | |
Apache Struts 2 | =2.0.12 | |
Apache Struts 2 | =2.0.13 | |
Apache Struts 2 | =2.0.14 | |
Apache Struts 2 | =2.1.0 | |
Apache Struts 2 | =2.1.1 | |
Apache Struts 2 | =2.1.2 | |
Apache Struts 2 | =2.1.3 | |
Apache Struts 2 | =2.1.4 | |
Apache Struts 2 | =2.1.5 | |
Apache Struts 2 | =2.1.6 | |
Apache Struts 2 | =2.1.8 | |
Apache Struts 2 | =2.1.8.1 | |
Apache Struts 2 | =2.2.1 | |
Apache Struts 2 | =2.2.1.1 | |
Apache Struts 2 | =2.2.3 | |
Apache Struts 2 | =2.2.3.1 | |
Apache Struts 2 | =2.3.1 | |
Apache Struts 2 | =2.3.1.1 | |
Apache Struts 2 | =2.3.1.2 | |
Apache Struts 2 | =2.3.3 | |
Apache Struts 2 | =2.3.4 | |
Apache Struts 2 | =2.3.4.1 | |
Apache Struts 2 | =2.3.5 | |
Apache Struts 2 | =2.3.6 | |
Apache Struts 2 | =2.3.7 | |
Apache Struts 2 | =2.3.8 | |
Apache Struts 2 | =2.3.9 | |
Apache Struts 2 | =2.3.10 | |
Apache Struts 2 | =2.3.11 | |
Apache Struts 2 | =2.3.12 | |
Apache Struts 2 | =2.3.13 | |
Apache Struts 2 | =2.3.14 | |
Apache Struts 2 | =2.3.14.1 | |
Apache Struts 2 | =2.3.14.2 | |
Apache Struts 2 | =2.3.14.3 | |
Apache Struts 2 | =2.3.15 | |
Apache Struts 2 | =2.3.15.1 | |
Apache Struts 2 | =2.3.15.2 | |
Apache Struts 2 | =2.3.15.3 | |
Apache Struts 2 | =2.3.16 | |
Apache Struts 2 | =2.3.16.1 | |
Apache Struts 2 | =2.3.16.2 | |
Apache Struts 2 | =2.3.16.3 | |
Apache Struts 2 | =2.3.17 | |
Apache Struts 2 | =2.3.19 | |
Apache Struts 2 | =2.3.20 | |
Apache Struts 2 | =2.3.20.1 | |
Apache Struts 2 | =2.3.20.2 | |
Apache Struts 2 | =2.3.21 | |
Apache Struts 2 | =2.3.22 | |
Apache Struts 2 | =2.3.23 | |
Apache Struts 2 | =2.3.24.2 | |
Apache Struts 2 | =2.3.24.3 | |
Apache Struts 2 | =2.3.25 | |
Apache Struts 2 | =2.3.26 | |
Apache Struts 2 | =2.3.27 | |
Apache Struts 2 | =2.3.28 | |
Apache Struts 2 | =2.3.28.1 | |
Apache Struts 2 | =2.3.29 | |
Apache Struts 2 | =2.3.30 | |
Apache Struts 2 | =2.3.31 | |
Apache Struts 2 | =2.3.32 | |
Apache Struts 2 | =2.3.33 | |
Apache Struts 2 | =2.5 | |
Apache Struts 2 | =2.5-beta1 | |
Apache Struts 2 | =2.5-beta2 | |
Apache Struts 2 | =2.5-beta3 | |
Apache Struts 2 | =2.5.1 | |
Apache Struts 2 | =2.5.2 | |
Apache Struts 2 | =2.5.3 | |
Apache Struts 2 | =2.5.4 | |
Apache Struts 2 | =2.5.5 | |
Apache Struts 2 | =2.5.6 | |
Apache Struts 2 | =2.5.7 | |
Apache Struts 2 | =2.5.8 | |
Apache Struts 2 | =2.5.9 | |
Apache Struts 2 | =2.5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12611 has a critical severity due to the potential for remote code execution vulnerabilities.
To fix CVE-2017-12611, upgrade to Apache Struts versions 2.5.11 or 2.3.34 or higher.
CVE-2017-12611 affects Apache Struts versions 2.0.0 to 2.3.33 and 2.5 to 2.5.10.1.
Yes, CVE-2017-12611 can be exploited remotely if the application is misconfigured and accepts untrusted input.
Yes, patches are available in the form of updated versions of Apache Struts, specifically 2.5.11 and 2.3.34.