First published: Wed Sep 20 2017(Updated: )
The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | =2.3.7 | |
Apache Struts | =2.3.8 | |
Apache Struts | =2.3.9 | |
Apache Struts | =2.3.10 | |
Apache Struts | =2.3.11 | |
Apache Struts | =2.3.12 | |
Apache Struts | =2.3.13 | |
Apache Struts | =2.3.14 | |
Apache Struts | =2.3.14.1 | |
Apache Struts | =2.3.14.2 | |
Apache Struts | =2.3.14.3 | |
Apache Struts | =2.3.15 | |
Apache Struts | =2.3.15.1 | |
Apache Struts | =2.3.15.2 | |
Apache Struts | =2.3.15.3 | |
Apache Struts | =2.3.16 | |
Apache Struts | =2.3.16.1 | |
Apache Struts | =2.3.16.2 | |
Apache Struts | =2.3.16.3 | |
Apache Struts | =2.3.17 | |
Apache Struts | =2.3.19 | |
Apache Struts | =2.3.20 | |
Apache Struts | =2.3.20.1 | |
Apache Struts | =2.3.20.2 | |
Apache Struts | =2.3.21 | |
Apache Struts | =2.3.22 | |
Apache Struts | =2.3.23 | |
Apache Struts | =2.3.24.2 | |
Apache Struts | =2.3.24.3 | |
Apache Struts | =2.3.25 | |
Apache Struts | =2.3.26 | |
Apache Struts | =2.3.27 | |
Apache Struts | =2.3.28 | |
Apache Struts | =2.3.28.1 | |
Apache Struts | =2.3.29 | |
Apache Struts | =2.3.30 | |
Apache Struts | =2.3.31 | |
Apache Struts | =2.3.32 | |
Apache Struts | =2.3.33 | |
Apache Struts | =2.5 | |
Apache Struts | =2.5-beta1 | |
Apache Struts | =2.5-beta2 | |
Apache Struts | =2.5-beta3 | |
Apache Struts | =2.5.1 | |
Apache Struts | =2.5.2 | |
Apache Struts | =2.5.3 | |
Apache Struts | =2.5.4 | |
Apache Struts | =2.5.5 | |
Apache Struts | =2.5.6 | |
Apache Struts | =2.5.7 | |
Apache Struts | =2.5.8 | |
Apache Struts | =2.5.9 | |
Apache Struts | =2.5.10 | |
Apache Struts | =2.5.10.1 | |
Apache Struts | =2.5.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.