Vulnerability Details : CVE-2011-3923
Public exploit exists!
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
Exploit prediction scoring system (EPSS) score for CVE-2011-3923
Probability of exploitation activity in the next 30 days: 94.95%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2011-3923
-
Apache Struts ParametersInterceptor Remote Code Execution
Disclosure Date: 2011-10-01First seen: 2020-04-26exploit/multi/http/struts_code_exec_parametersThis module exploits a remote command execution vulnerability in Apache Struts versions < 2.3.1.2. This issue is caused because the ParametersInterceptor allows for the use of parentheses which in turn allows it to interpret parameter values as OGNL expressions durin
CVSS scores for CVE-2011-3923
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2011-3923
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3923
-
http://www.securitytracker.com/id?1026575
Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands - SecurityTrackerThird Party Advisory;VDB Entry
-
https://security-tracker.debian.org/tracker/CVE-2011-3923
CVE-2011-3923Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923
997755 – (CVE-2011-3923) CVE-2011-3923 struts2: Remote code execution via OGNL injention in HTTP parameter valuesIssue Tracking;Third Party Advisory
-
http://seclists.org/fulldisclosure/2014/Jul/38
Full Disclosure: SEC Consult SA-20140710-0 :: Multiple critical vulnerabilities in Shopizer webshopExploit;Mailing List;Third Party Advisory
-
http://www.exploit-db.com/exploits/24874
Apache Struts - 'ParametersInterceptor' Remote Code Execution (Metasploit) - Multiple remote ExploitExploit;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/51628
Apache Struts 'ParameterInterceptor' Class OGNL (CVE-2011-3923) Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/72585
Apache Struts ParameterInterceptor security bypass CVE-2011-3923 Vulnerability ReportThird Party Advisory;VDB Entry
Products affected by CVE-2011-3923
- cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*