Vulnerability Description
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Struts | >= 2.0.0, < 2.3.1.2 |
| Redhat | Jboss Enterprise Web Server | 1.0.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2014/Jul/38
- http://www.exploit-db.com/exploits/24874
- http://www.securityfocus.com/bid/51628
- http://www.securitytracker.com/id?1026575
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72585
- https://security-tracker.debian.org/tracker/CVE-2011-3923
- http://seclists.org/fulldisclosure/2014/Jul/38
- http://www.exploit-db.com/exploits/24874
- http://www.securityfocus.com/bid/51628
- http://www.securitytracker.com/id?1026575
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72585
- https://security-tracker.debian.org/tracker/CVE-2011-3923
FAQ
What is CVE-2011-3923?
CVE-2011-3923 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
How severe is CVE-2011-3923?
CVE-2011-3923 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2011-3923?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Struts, Redhat Jboss Enterprise Web Server.