Vulnerabilities > CVE-2018-1327 - Unspecified vulnerability in Apache Struts

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
apache
nessus

Summary

The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.

Vulnerable Configurations

Part Description Count
Application
Apache
86

Nessus

NASL familyMisc.
NASL idSTRUTS_2_5_16.NASL
descriptionThe version of Apache Struts running on the remote host is prior to 2.5.16. It, therefore, contains a flaw in the REST plugin when using the XStream handler that is triggered during the handling of a specially crafted request with an XML payload. This may allow a remote attacker to cause a denial of service. Note that Nessus has not tested for these issues but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id108760
published2018-03-30
reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/108760
titleApache Struts XStream Handler REST Plugin XML Request Handling Remote DoS (S2-056)

Seebug

bulletinFamilyexploit
description### Summary A crafted XML request can be used to perform a DoS attack when using the Struts REST plugin | | | | :------------ | :------------ | | Who should read this | All Struts 2 developers and users which are using the REST plugin | | Impact of vulnerability | A DoS attack is possible when using XStream handler with the Struts REST plugin. | | Maximum security rating | Medium | | Recommendation | Upgrade to Struts 2.5.16 | | Affected Software | Struts 2.1.1 - Struts 2.5.14.1 | | Reporter | Yevgeniy Grushka & Alvaro Munoz from HPE | | CVE Identifier | CVE-2018-1327 | ### Problem The REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. ### Solution Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. ### Backward compatibility No backward incompatibility issues are expected. ### Workaround Use Jackson XML handler instead of the default XStream handler as described [here](http://struts.apache.org/plugins/rest/#custom-contenttypehandlers).
idSSV:97204
last seen2018-03-27
modified2018-03-27
published2018-03-27
reporterRoot
titleApache Struts2 S2-056(CVE-2018-1327)