Bug 1488482 - (CVE-2017-9805) CVE-2017-9805 struts: RCE attack via REST plugin with XStream handler to deserialise XML requests
CVE-2017-9805 struts: RCE attack via REST plugin with XStream handler to dese...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20170905,repo...
: Security
Depends On: 1488487 1488488
Blocks: 1488486
  Show dependency treegraph
 
Reported: 2017-09-05 09:47 EDT by Adam Mariš
Modified: 2018-03-28 09:11 EDT (History)
30 users (show)

See Also:
Fixed In Version: struts 2.5.13
Doc Type: If docs needed, set a value
Doc Text:
The REST Plugin in Apache Struts2 is using a XStreamHandler with an instance of XStream for deserialization without any type filtering which could lead to Remote Code Execution when deserializing XML payloads. An attacker could use this flaw to execute arbitrary code or conduct further attacks.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-09-06 04:51:03 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-09-05 09:47:04 EDT
The REST Plugin is using a XStreamHandler with an instance of XStream for deserialization without any type filtering and this can lead to Remote Code Execution when deserializing XML payloads.

Affected versions:

Struts 2.5 - Struts 2.5.12

External References:

https://struts.apache.org/docs/s2-052.html
Comment 1 Adam Mariš 2017-09-05 10:01:34 EDT
Created struts tracking bugs for this issue:

Affects: epel-7 [bug 1488487]
Affects: fedora-all [bug 1488488]
Comment 2 Chess Hazlett 2017-09-05 14:28:35 EDT
Statement:

This issue did not affect any of the Red Hat products as they did not include the Apache Struts 2 package.

Note You need to log in before you can comment on or make changes to this bug.