TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2014-0114

N/A

Beschreibung

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht4/30/2014
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

apache:commons_beanutilsapache:struts

Schwachen (CWE)

CWE-20

Referenzen

http://advisories.mageia.org/MGASA-2014-0219.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=140119284401582&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=140801096002766&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=141451023707502&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2014/06/15/10(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2014/07/08/1(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2014/Dec/23(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/57477(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58710(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58851(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/58947(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59014(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59118(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59228(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59245(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59246(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59430(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59464(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59479(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59480(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59704(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59718(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60177(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/60703(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21674128(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21674812(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675266(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675387(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675689(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675898(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21675972(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676091(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676110(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676303(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676375(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676931(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21677110(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg27042296(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2014/dsa-2940(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=swg21675496(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67121(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2669(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2995(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/solutions/869353(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1091938(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1116665(af854a3a-2127-422b-91ae-364da2661108)
https://issues.apache.org/jira/browse/BEANUTILS-463(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201607-09(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20140911-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180629-0006/(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.