Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 788286 - (CVE-2012-1007) CVE-2012-1007 struts: multiple XSS flaws
CVE-2012-1007 struts: multiple XSS flaws
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120201,repor...
: Security
Depends On:
Blocks: 788287
  Show dependency treegraph
 
Reported: 2012-02-07 18:54 EST by Vincent Danen
Modified: 2016-03-04 07:05 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-02-07 22:14:53 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2012-02-07 18:54:00 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-1007 to
the following vulnerability:

Name: CVE-2012-1007
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1007
Assigned: 20120206
Reference: http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt
Reference: http://secpod.org/blog/?p=450

Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts
1.3.10 allow remote attackers to inject arbitrary web script or HTML
via (1) the name parameter to struts-examples/upload/upload-submit.do,
or the message parameter to (2) struts-cookbook/processSimple.do or
(3) struts-cookbook/processDyna.do.
Comment 1 David Jorm 2012-02-07 22:14:53 EST
Statement:

Not Vulnerable. This issue only affects the struts-cookbook and struts-examples packages, which are not shipped by Red Hat. It does not affect the struts component as shipped with various Red Hat products.

Note You need to log in before you can comment on or make changes to this bug.