Vulnerability Description
The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Struts | 1.0 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN86448949/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042Vendor Advisory
- http://www.debian.org/security/2016/dsa-3536
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/74423
- https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-ENPatch
- https://security.netapp.com/advisory/ntap-20180629-0006/
- http://jvn.jp/en/jp/JVN86448949/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000042Vendor Advisory
- http://www.debian.org/security/2016/dsa-3536
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/74423
- https://en.osdn.jp/projects/terasoluna/wiki/StrutsPatch2-ENPatch
- https://security.netapp.com/advisory/ntap-20180629-0006/
FAQ
What is CVE-2015-0899?
CVE-2015-0899 is a vulnerability with a CVSS score of 7.5 (HIGH). The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.
How severe is CVE-2015-0899?
CVE-2015-0899 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-0899?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Struts.