← Retour aux CVEs
CVE-2014-0112
N/ADescription
ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
Details CVE
Score CVSS v3.1N/A
Publie4/29/2014
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
apache:struts
Faiblesses (CWE)
CWE-264
References
http://jvn.jp/en/jp/JVN19294237/index.html(secalert@redhat.com)
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045(secalert@redhat.com)
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html(secalert@redhat.com)
http://secunia.com/advisories/59178(secalert@redhat.com)
http://secunia.com/advisories/59500(secalert@redhat.com)
http://www-01.ibm.com/support/docview.wss?uid=swg21676706(secalert@redhat.com)
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/531952/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/532549/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/67064(secalert@redhat.com)
http://www.vmware.com/security/advisories/VMSA-2014-0007.html(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:0910(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1091939(secalert@redhat.com)
https://cwiki.apache.org/confluence/display/WW/S2-021(secalert@redhat.com)
http://jvn.jp/en/jp/JVN19294237/index.html(af854a3a-2127-422b-91ae-364da2661108)
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000045(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59178(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/59500(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21676706(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/531952/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/532549/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67064(af854a3a-2127-422b-91ae-364da2661108)
http://www.vmware.com/security/advisories/VMSA-2014-0007.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0910(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1091939(af854a3a-2127-422b-91ae-364da2661108)
https://cwiki.apache.org/confluence/display/WW/S2-021(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.