Apache Struts 代码执行漏洞

admin 2024-01-15 08:45:15 YS 来源:ZONE.CI 全球网 0 阅读模式
> Apache Struts 代码执行漏洞

Apache Struts 代码执行漏洞

CNNVD-ID编号 CNNVD-202008-743 CVE编号 CVE-2019-0230
发布时间 2020-08-13 更新时间 2021-01-20
漏洞类型 代码执行 漏洞来源 N/A
危险等级 超危 威胁类型 远程
厂商 N/A

漏洞介绍

Apache Struts是美国阿帕奇(Apache)基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。

Apache Struts 2.0.0版本至2.5.20版本中存在代码执行漏洞。攻击者可借助特制的请求利用该漏洞执行代码。

漏洞补丁

目前厂商已发布升级了Apache Struts 代码执行漏洞的补丁,Apache Struts 代码执行漏洞的补丁获取链接:

参考网址

来源:struts.apache.org

链接:https://struts.apache.org/announce.html#a20200813

来源:MISC

链接:https://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html

来源:MISC

链接:https://cwiki.apache.org/confluence/display/ww/s2-059

来源:MISC

链接:https://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html

来源:MISC

链接:https://launchpad.support.sap.com/#/notes/2982840

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html

来源:www.oracle.com

链接:https://www.oracle.com/security-alerts/cpujan2021.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-apache-struts-publicly-disclosed-vulnerability-affects-content-collector-for-email-content-collector-for-file-systems-content-collector-for-microsoft-sharepoint-and-content-col/

来源:cxsecurity.com

链接:https://cxsecurity.com/issue/WLB-2020110136

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-apache-struts-affect-ibm-sterling-file-gateway-cve-2019-0233-cve-2019-0230-2/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-apache-struts-affect-ibm-sterling-file-gateway-cve-2019-0233-cve-2019-0230/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-apache-struts-affect-ibm-sterling-file-gateway-cve-2019-0233-cve-2019-0230-3/

来源:www.exploit-db.com

链接:https://www.exploit-db.com/exploits/49068

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-apache-struts-affect-tivoli-netcool-omnibus-webgui-cve-2019-0233-cve-2019-0230/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-struts-affect-ibm-tivoli-application-dependency-discovery-manager/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Apache-Struts-code-execution-via-Double-OGNL-Evaluation-33073

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2803/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-0230

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-apache-struts-publicly-disclosed-vulnerability-affects-content-collector-for-email-content-collector-for-file-systems-content-collector-for-microsoft-sharepoint-and-content-col-4/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202008-743

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  3