All Vulnerability Reports

CVE-2017-9805: Apache Struts Remote Code Execution


Severity

Advisory/Critical

Vendor

Apache

Versions Affected
  • Apache Struts 2:
    • 2.3.x versions prior to 2.3.34
    • 2.5.x versions prior to 2.5.13
Description

An RCE attack is possible when using the Struts REST plugin with XStream handler to deserialise XML requests [1].

Affected Pivotal Products and Versions
  • Pivotal Cloud Foundry
    • The Cloud Foundry team has determined that core releases do not package Apache Struts.
    • Pivotal has determined that PCF components also do not package Apache Struts.
    • However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [1].
    • If you have further questions, please contact Pivotal Support at https://support.pivotal.io.
  • Spring
    • Spring versions 4.x, 5.x and above are able to use the Spring plugin that is distributed with Apache Struts 2.
    • Particular applications using Spring versions 4.x, 5.x and later may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [1].
    • If you have further questions, please contact Pivotal Support at https://support.pivotal.io.
Mitigation

Users of affected versions should apply the following mitigation:

  • Pivotal Cloud Foundry
    • Pivotal has determined that PCF is not exposed to this particular vulnerability and therefore does not require any PCF-specific upgrades.
    • However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [1].
  • Spring
    • Particular applications using Spring versions 4.x, 5.x and later may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [1].
    • However, if your Spring Boot applications do not use Apache Struts (e.g. they don't have org.apache.struts listed in their dependencies) then no action is required.
    • If you have further questions, please contact Pivotal Support at https://support.pivotal.io.
Credit

Man Yue Mo

References