Vulnerability Description
The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
CVSS Score
9.8
CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Struts | 2.3.20 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN07710476/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110VDB EntryVendor Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/91275Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1348238Issue TrackingThird Party AdvisoryVDB Entry
- https://struts.apache.org/docs/s2-037.htmlVendor Advisory
- http://jvn.jp/en/jp/JVN07710476/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110VDB EntryVendor Advisory
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securityfocus.com/bid/91275Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1348238Issue TrackingThird Party AdvisoryVDB Entry
- https://struts.apache.org/docs/s2-037.htmlVendor Advisory
FAQ
What is CVE-2016-4438?
CVE-2016-4438 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
How severe is CVE-2016-4438?
CVE-2016-4438 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-4438?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Struts.