TROYANOSYVIRUS
Volver a CVEs

CVE-2014-0114

N/A

Descripcion

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado4/30/2014
Ultima modificacion4/12/2025
Fuentenvd
Avistamientos honeypot0

Productos afectados

apache:commons_beanutilsapache:struts

Debilidades (CWE)

CWE-20

Referencias

http://advisories.mageia.org/MGASA-2014-0219.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=140119284401582&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=140801096002766&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141451023707502&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2014/06/15/10(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2014/07/08/1(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2014/Dec/23(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/57477(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58710(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58851(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58947(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59014(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59118(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59228(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59245(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59246(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59430(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59464(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59479(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59480(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59704(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59718(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60177(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60703(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21674128(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21674812(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675266(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675387(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675689(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675898(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675972(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676091(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676110(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676303(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676375(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676931(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21677110(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg27042296(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2940(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=swg21675496(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67121(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2669(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2995(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/solutions/869353(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1091938(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1116665(af854a3a-2127-422b-91ae-364da2661108)
https://issues.apache.org/jira/browse/BEANUTILS-463(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201607-09(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20140911-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180629-0006/(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.