CVE-2018-11776

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.
References
Link Resource
http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt Mailing List Third Party Advisory Broken Link
http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch Third Party Advisory
http://www.securityfocus.com/bid/105125 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041547 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041888 Broken Link Third Party Advisory VDB Entry
https://cwiki.apache.org/confluence/display/WW/S2-057 Issue Tracking Third Party Advisory
https://github.com/hook-s3c/CVE-2018-11776-Python-PoC Exploit Third Party Advisory
https://lgtm.com/blog/apache_struts_CVE-2018-11776 Exploit Third Party Advisory
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012 Third Party Advisory
https://security.netapp.com/advisory/ntap-20180822-0001/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20181018-0002/ Third Party Advisory
https://www.exploit-db.com/exploits/45260/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45262/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45367/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.exploit-db.com/exploits/45367/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45262/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45260/ Exploit Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20181018-0002/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20180822-0001/ Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012 Third Party Advisory
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List
https://lgtm.com/blog/apache_struts_CVE-2018-11776 Exploit Third Party Advisory
https://github.com/hook-s3c/CVE-2018-11776-Python-PoC Exploit Third Party Advisory
https://cwiki.apache.org/confluence/display/WW/S2-057 Issue Tracking Third Party Advisory
http://www.securitytracker.com/id/1041888 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041547 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105125 Broken Link Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html Patch Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt Mailing List Third Party Advisory Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:01

Type Values Removed Values Added
References () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt - Mailing List, Third Party Advisory () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt - Mailing List, Third Party Advisory, Broken Link

23 Jan 2025, 15:36

Type Values Removed Values Added
References (SECTRACK) http://www.securitytracker.com/id/1041888 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041888 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/105125 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105125 - Broken Link, Third Party Advisory, VDB Entry
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/45367/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45367/ - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt - Mailing List, Third Party Advisory () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-005.txt - Mailing List, Third Party Advisory
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/45260/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45260/ - Exploit, Third Party Advisory, VDB Entry
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/45262/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45262/ - Exploit, Third Party Advisory, VDB Entry
References (CONFIRM) https://security.netapp.com/advisory/ntap-20180822-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180822-0001/ - Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20181018-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20181018-0002/ - Third Party Advisory
References (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012 - Third Party Advisory () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012 - Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1041547 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041547 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://cwiki.apache.org/confluence/display/WW/S2-057 - Issue Tracking, Third Party Advisory () https://cwiki.apache.org/confluence/display/WW/S2-057 - Issue Tracking, Third Party Advisory
References (MISC) https://github.com/hook-s3c/CVE-2018-11776-Python-PoC - Exploit, Third Party Advisory () https://github.com/hook-s3c/CVE-2018-11776-Python-PoC - Exploit, Third Party Advisory
References (MISC) https://lgtm.com/blog/apache_struts_CVE-2018-11776 - Exploit, Third Party Advisory () https://lgtm.com/blog/apache_struts_CVE-2018-11776 - Exploit, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (CONFIRM) https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory
References (CONFIRM) http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/alert-cve-2018-11776-5072787.html - Patch, Third Party Advisory

25 Jul 2024, 14:48

Type Values Removed Values Added
CPE cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*
First Time Netapp active Iq Unified Manager
Oracle enterprise Manager Base Platform
Oracle mysql Enterprise Monitor
Oracle communications Policy Management
Netapp oncommand Workflow Automation
Oracle
Netapp snapcenter
Netapp oncommand Insight
Netapp
References (BID) http://www.securityfocus.com/bid/105125 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/105125 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1041888 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1041888 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1041547 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1041547 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html - Third Party Advisory, VDB Entry
References (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory
References () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E - Mailing List
CWE CWE-20 NVD-CWE-noinfo

07 Nov 2023, 02:51

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'name': '[announce] 20200131 Apache Software Foundation Security Report: 2019', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E -

12 Jun 2023, 07:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html -

Information

Published : 2018-08-22 13:29

Updated : 2025-03-13 21:01


NVD link : CVE-2018-11776

Mitre link : CVE-2018-11776


JSON object : View

Products Affected

netapp

  • snapcenter
  • oncommand_insight
  • active_iq_unified_manager
  • oncommand_workflow_automation

apache

  • struts

oracle

  • mysql_enterprise_monitor
  • communications_policy_management
  • enterprise_manager_base_platform