← Back to CVEs
CVE-2017-9791
CRITICALCISA KEV9.8
Description
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/10/2017
Last Modified4/21/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorApache
ProductStruts 1
Vulnerability NameApache Struts 1 Improper Input Validation Vulnerability
KEV Date Added2022-02-10
Remediation Due Date2022-08-10
Ransomware UseUnknown
Affected Products
apache:struts
Weaknesses (CWE)
CWE-20CWE-20
References
http://struts.apache.org/docs/s2-048.html(security@apache.org)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html(security@apache.org)
http://www.securityfocus.com/bid/99484(security@apache.org)
http://www.securitytracker.com/id/1038838(security@apache.org)
https://security.netapp.com/advisory/ntap-20180706-0002/(security@apache.org)
https://www.exploit-db.com/exploits/42324/(security@apache.org)
https://www.exploit-db.com/exploits/44643/(security@apache.org)
http://struts.apache.org/docs/s2-048.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/99484(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1038838(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180706-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42324/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44643/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9791(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.