Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2011-5057

Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.505
EPSS Ranking 97.7%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2011-5057
  • Apache » Struts » Version: 2.0.0
    cpe:2.3:a:apache:struts:2.0.0
  • Apache » Struts » Version: 2.0.1
    cpe:2.3:a:apache:struts:2.0.1
  • Apache » Struts » Version: 2.0.10
    cpe:2.3:a:apache:struts:2.0.10
  • Apache » Struts » Version: 2.0.11
    cpe:2.3:a:apache:struts:2.0.11
  • Apache » Struts » Version: 2.0.11.1
    cpe:2.3:a:apache:struts:2.0.11.1
  • Apache » Struts » Version: 2.0.11.2
    cpe:2.3:a:apache:struts:2.0.11.2
  • Apache » Struts » Version: 2.0.12
    cpe:2.3:a:apache:struts:2.0.12
  • Apache » Struts » Version: 2.0.13
    cpe:2.3:a:apache:struts:2.0.13
  • Apache » Struts » Version: 2.0.14
    cpe:2.3:a:apache:struts:2.0.14
  • Apache » Struts » Version: 2.0.2
    cpe:2.3:a:apache:struts:2.0.2
  • Apache » Struts » Version: 2.0.3
    cpe:2.3:a:apache:struts:2.0.3
  • Apache » Struts » Version: 2.0.4
    cpe:2.3:a:apache:struts:2.0.4
  • Apache » Struts » Version: 2.0.5
    cpe:2.3:a:apache:struts:2.0.5
  • Apache » Struts » Version: 2.0.6
    cpe:2.3:a:apache:struts:2.0.6
  • Apache » Struts » Version: 2.0.7
    cpe:2.3:a:apache:struts:2.0.7
  • Apache » Struts » Version: 2.0.8
    cpe:2.3:a:apache:struts:2.0.8
  • Apache » Struts » Version: 2.0.9
    cpe:2.3:a:apache:struts:2.0.9
  • Apache » Struts » Version: 2.1.0
    cpe:2.3:a:apache:struts:2.1.0
  • Apache » Struts » Version: 2.1.1
    cpe:2.3:a:apache:struts:2.1.1
  • Apache » Struts » Version: 2.1.2
    cpe:2.3:a:apache:struts:2.1.2
  • Apache » Struts » Version: 2.1.3
    cpe:2.3:a:apache:struts:2.1.3
  • Apache » Struts » Version: 2.1.4
    cpe:2.3:a:apache:struts:2.1.4
  • Apache » Struts » Version: 2.1.5
    cpe:2.3:a:apache:struts:2.1.5
  • Apache » Struts » Version: 2.1.6
    cpe:2.3:a:apache:struts:2.1.6
  • Apache » Struts » Version: 2.1.7
    cpe:2.3:a:apache:struts:2.1.7
  • Apache » Struts » Version: 2.1.8
    cpe:2.3:a:apache:struts:2.1.8
  • Apache » Struts » Version: 2.1.8.1
    cpe:2.3:a:apache:struts:2.1.8.1
  • Apache » Struts » Version: 2.2.1
    cpe:2.3:a:apache:struts:2.2.1
  • Apache » Struts » Version: 2.2.1.1
    cpe:2.3:a:apache:struts:2.2.1.1
  • Apache » Struts » Version: 2.2.3
    cpe:2.3:a:apache:struts:2.2.3
  • Apache » Struts » Version: 2.2.3.1
    cpe:2.3:a:apache:struts:2.2.3.1
  • Apache » Struts » Version: 2.3.0
    cpe:2.3:a:apache:struts:2.3.0
  • Apache » Struts » Version: 2.3.1
    cpe:2.3:a:apache:struts:2.3.1
  • Apache » Struts » Version: 2.3.1.1
    cpe:2.3:a:apache:struts:2.3.1.1
  • Apache » Struts » Version: 2.3.1.2
    cpe:2.3:a:apache:struts:2.3.1.2


Contact Us

Shodan ® - All rights reserved