Executive Summary
Summary | |
---|---|
Title | VMware vCenter Orchestrator remote code execution vulnerability |
Informations | |||
---|---|---|---|
Name | VMSA-2011-0005 | First vendor Publication | 2011-03-14 |
Vendor | VMware | Last vendor Modification | 2011-03-14 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
VMware vCenter Orchestrator is an application to automate management tasks. It embeds Apache Struts (version 2.0.11) which is a third party component. The following vulnerability has been reported in Apache Struts 2.0.11 or earlier. A remote execution of code vulnerability could allow malicious users to bypass the '#'-usage protection built into the ParametersInterceptor, which could allow server side context objects to be manipulated. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-1870 to this vulnerability. VMware would like to thank the Vulnerability Research Team of Digital Defense, Inc. for reporting this issue to us. Apache Struts version 2.0.11 and earlier also contain vulnerabilities which have not been assigned CVE names. This advisory also addresses these vulnerabilities described at the following URLs: * http://struts.apache.org/2.2.1/docs/s2-002.html * http://struts.apache.org/2.2.1/docs/s2-003.html * http://struts.apache.org/2.2.1/docs/s2-004.html |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2011-0005.html |
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Apache Struts2 XWork ParameterInterceptor security bypass | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-07-14 | Struts2/XWork < 2.2.0 Remote Command Execution Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2010-12-21 | Name : Apache Struts2/XWork Remote Command Execution Vulnerability File : nvt/gb_apache_struts_xwork_cmd_exec_vuln.nasl |
2010-09-10 | Name : Struts Remote Command Execution Vulnerability File : nvt/gb_apache_struts_remote_cmd_exec_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66280 | Struts XWork ParameterInterceptor Server-Side Object Remote Code Execution |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apache Struts OGNL parameter interception bypass command execution attempt RuleID : 18931 - Revision : 5 - Type : SERVER-APACHE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-07-29 | Name : A remote web application uses a framework that is affected by a code executio... File : struts_xwork_ognl_code_execution_safe.nasl - Type : ACT_ATTACK |
Alert History
Date | Informations |
---|---|
2013-05-11 00:56:43 |
|