← Voltar para CVEs
CVE-2013-2251
CRITICALCISA KEV9.8
Descricao
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado7/20/2013
Ultima modificacao4/22/2026
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorApache
ProdutoStruts
Nome da vulnerabilidadeApache Struts Improper Input Validation Vulnerability
Data inclusao KEV2022-03-25
Prazo de remediacao2022-04-15
Uso em ransomwareUnknown
Produtos afetados
apache:archivaapache:strutsfujitsu:interstage_business_process_manager_analyticsmicrosoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012oracle:siebel_apps_-_e-billingoracle:solarisredhat:enterprise_linux
Fraquezas (CWE)
CWE-74CWE-74
Referencias
http://archiva.apache.org/security.html(secalert@redhat.com)
http://cxsecurity.com/issue/WLB-2014010087(secalert@redhat.com)
http://osvdb.org/98445(secalert@redhat.com)
http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html(secalert@redhat.com)
http://seclists.org/fulldisclosure/2013/Oct/96(secalert@redhat.com)
http://seclists.org/oss-sec/2014/q1/89(secalert@redhat.com)
http://struts.apache.org/release/2.3.x/docs/s2-016.html(secalert@redhat.com)
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2(secalert@redhat.com)
http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html(secalert@redhat.com)
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html(secalert@redhat.com)
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html(secalert@redhat.com)
http://www.securityfocus.com/bid/61189(secalert@redhat.com)
http://www.securityfocus.com/bid/64758(secalert@redhat.com)
http://www.securitytracker.com/id/1029184(secalert@redhat.com)
http://www.securitytracker.com/id/1032916(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90392(secalert@redhat.com)
http://archiva.apache.org/security.html(af854a3a-2127-422b-91ae-364da2661108)
http://cxsecurity.com/issue/WLB-2014010087(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/98445(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2013/Oct/96(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2014/q1/89(af854a3a-2127-422b-91ae-364da2661108)
http://struts.apache.org/release/2.3.x/docs/s2-016.html(af854a3a-2127-422b-91ae-364da2661108)
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2(af854a3a-2127-422b-91ae-364da2661108)
http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/61189(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/64758(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1029184(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1032916(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90392(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-2251(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.