CVE-2017-9805

The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
References
Link Resource
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html Patch Third Party Advisory
http://www.securityfocus.com/bid/100609 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/100609 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039263 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039263 Broken Link Third Party Advisory VDB Entry
https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax Vendor Advisory
https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1488482 Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1488482 Issue Tracking Third Party Advisory VDB Entry
https://cwiki.apache.org/confluence/display/WW/S2-052 Mitigation Vendor Advisory
https://cwiki.apache.org/confluence/display/WW/S2-052 Mitigation Vendor Advisory
https://lgtm.com/blog/apache_struts_CVE-2017-9805 Broken Link
https://lgtm.com/blog/apache_struts_CVE-2017-9805 Broken Link
https://security.netapp.com/advisory/ntap-20170907-0001/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20170907-0001/ Third Party Advisory
https://struts.apache.org/docs/s2-052.html Mitigation Vendor Advisory
https://struts.apache.org/docs/s2-052.html Mitigation Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2 Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2 Third Party Advisory
https://www.exploit-db.com/exploits/42627/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42627/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/112992 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/112992 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_performance_analysis:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_distribution_suite_for_internet_streaming:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:media_experience_engine:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:media_experience_engine:3.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:11.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:11.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\(1\):*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*

History

23 Jan 2025, 15:34

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20170907-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20170907-0001/ - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/100609 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100609 - Broken Link, Third Party Advisory, VDB Entry
References (CERT-VN) https://www.kb.cert.org/vuls/id/112992 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/112992 - Third Party Advisory, US Government Resource
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2 - Third Party Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2 - Third Party Advisory
References (MISC) https://lgtm.com/blog/apache_struts_CVE-2017-9805 - Broken Link () https://lgtm.com/blog/apache_struts_CVE-2017-9805 - Broken Link
References (CONFIRM) https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax - Vendor Advisory () https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax - Vendor Advisory
References (CONFIRM) https://cwiki.apache.org/confluence/display/WW/S2-052 - Mitigation, Vendor Advisory () https://cwiki.apache.org/confluence/display/WW/S2-052 - Mitigation, Vendor Advisory
References (CONFIRM) http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - Patch, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1039263 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039263 - Broken Link, Third Party Advisory, VDB Entry
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/42627/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42627/ - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1488482 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1488482 - Issue Tracking, Third Party Advisory, VDB Entry
References (CONFIRM) https://struts.apache.org/docs/s2-052.html - Mitigation, Vendor Advisory () https://struts.apache.org/docs/s2-052.html - Mitigation, Vendor Advisory

25 Jul 2024, 13:40

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20170907-0001/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20170907-0001/ - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - Third Party Advisory (CONFIRM) http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html - Patch, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1039263 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1039263 - Broken Link, Third Party Advisory, VDB Entry
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/42627/ - Third Party Advisory, VDB Entry (EXPLOIT-DB) https://www.exploit-db.com/exploits/42627/ - Exploit, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/100609 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/100609 - Broken Link, Third Party Advisory, VDB Entry
References (CERT-VN) https://www.kb.cert.org/vuls/id/112992 - (CERT-VN) https://www.kb.cert.org/vuls/id/112992 - Third Party Advisory, US Government Resource
References (MISC) https://lgtm.com/blog/apache_struts_CVE-2017-9805 - (MISC) https://lgtm.com/blog/apache_struts_CVE-2017-9805 - Broken Link
References (CONFIRM) https://struts.apache.org/docs/s2-052.html - Vendor Advisory (CONFIRM) https://struts.apache.org/docs/s2-052.html - Mitigation, Vendor Advisory
First Time Cisco media Experience Engine
Cisco video Distribution Suite For Internet Streaming
Cisco hosted Collaboration Solution
Cisco network Performance Analysis
Cisco digital Media Manager
Netapp
Cisco
Netapp oncommand Balance
CPE cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_performance_analysis:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:digital_media_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:media_experience_engine:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:11.5\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:11.6\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:media_experience_engine:3.5:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:video_distribution_suite_for_internet_streaming:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:11.0\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\(1\):*:*:*:*:*:*:*

Information

Published : 2017-09-15 19:29

Updated : 2025-03-06 19:48


NVD link : CVE-2017-9805

Mitre link : CVE-2017-9805


JSON object : View

Products Affected

cisco

  • network_performance_analysis
  • hosted_collaboration_solution
  • digital_media_manager
  • media_experience_engine
  • video_distribution_suite_for_internet_streaming

apache

  • struts

netapp

  • oncommand_balance
CWE
CWE-502

Deserialization of Untrusted Data