Vulnerability Details CVE-2018-1327
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.034
EPSS Ranking 86.9%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2018-1327
-
cpe:2.3:a:apache:struts:2.1.1
-
cpe:2.3:a:apache:struts:2.1.2
-
cpe:2.3:a:apache:struts:2.1.3
-
cpe:2.3:a:apache:struts:2.1.4
-
cpe:2.3:a:apache:struts:2.1.5
-
cpe:2.3:a:apache:struts:2.1.6
-
cpe:2.3:a:apache:struts:2.1.7
-
cpe:2.3:a:apache:struts:2.1.8
-
cpe:2.3:a:apache:struts:2.1.8.1
-
cpe:2.3:a:apache:struts:2.2.1
-
cpe:2.3:a:apache:struts:2.2.1.1
-
cpe:2.3:a:apache:struts:2.2.3
-
cpe:2.3:a:apache:struts:2.2.3.1
-
cpe:2.3:a:apache:struts:2.3.0
-
cpe:2.3:a:apache:struts:2.3.1
-
cpe:2.3:a:apache:struts:2.3.1.1
-
cpe:2.3:a:apache:struts:2.3.1.2
-
cpe:2.3:a:apache:struts:2.3.10
-
cpe:2.3:a:apache:struts:2.3.11
-
cpe:2.3:a:apache:struts:2.3.12
-
cpe:2.3:a:apache:struts:2.3.13
-
cpe:2.3:a:apache:struts:2.3.14
-
cpe:2.3:a:apache:struts:2.3.14.1
-
cpe:2.3:a:apache:struts:2.3.14.2
-
cpe:2.3:a:apache:struts:2.3.14.3
-
cpe:2.3:a:apache:struts:2.3.15
-
cpe:2.3:a:apache:struts:2.3.15.1
-
cpe:2.3:a:apache:struts:2.3.15.2
-
cpe:2.3:a:apache:struts:2.3.15.3
-
cpe:2.3:a:apache:struts:2.3.16
-
cpe:2.3:a:apache:struts:2.3.16.1
-
cpe:2.3:a:apache:struts:2.3.16.2
-
cpe:2.3:a:apache:struts:2.3.16.3
-
cpe:2.3:a:apache:struts:2.3.17
-
cpe:2.3:a:apache:struts:2.3.19
-
cpe:2.3:a:apache:struts:2.3.20
-
cpe:2.3:a:apache:struts:2.3.20.1
-
cpe:2.3:a:apache:struts:2.3.20.2
-
cpe:2.3:a:apache:struts:2.3.20.3
-
cpe:2.3:a:apache:struts:2.3.21
-
cpe:2.3:a:apache:struts:2.3.22
-
cpe:2.3:a:apache:struts:2.3.23
-
cpe:2.3:a:apache:struts:2.3.24
-
cpe:2.3:a:apache:struts:2.3.24.1
-
cpe:2.3:a:apache:struts:2.3.24.2
-
cpe:2.3:a:apache:struts:2.3.24.3
-
cpe:2.3:a:apache:struts:2.3.25
-
cpe:2.3:a:apache:struts:2.3.26
-
cpe:2.3:a:apache:struts:2.3.27
-
cpe:2.3:a:apache:struts:2.3.28
-
cpe:2.3:a:apache:struts:2.3.28.1
-
cpe:2.3:a:apache:struts:2.3.29
-
cpe:2.3:a:apache:struts:2.3.3
-
cpe:2.3:a:apache:struts:2.3.30
-
cpe:2.3:a:apache:struts:2.3.31
-
cpe:2.3:a:apache:struts:2.3.32
-
cpe:2.3:a:apache:struts:2.3.33
-
cpe:2.3:a:apache:struts:2.3.34
-
cpe:2.3:a:apache:struts:2.3.35
-
cpe:2.3:a:apache:struts:2.3.36
-
cpe:2.3:a:apache:struts:2.3.37
-
cpe:2.3:a:apache:struts:2.3.4
-
cpe:2.3:a:apache:struts:2.3.4.1
-
cpe:2.3:a:apache:struts:2.3.5
-
cpe:2.3:a:apache:struts:2.3.6
-
cpe:2.3:a:apache:struts:2.3.7
-
cpe:2.3:a:apache:struts:2.3.8
-
cpe:2.3:a:apache:struts:2.3.9
-
cpe:2.3:a:apache:struts:2.5
-
cpe:2.3:a:apache:struts:2.5.0
-
cpe:2.3:a:apache:struts:2.5.1
-
cpe:2.3:a:apache:struts:2.5.10
-
cpe:2.3:a:apache:struts:2.5.10.1
-
cpe:2.3:a:apache:struts:2.5.11
-
cpe:2.3:a:apache:struts:2.5.12
-
cpe:2.3:a:apache:struts:2.5.13
-
cpe:2.3:a:apache:struts:2.5.14
-
cpe:2.3:a:apache:struts:2.5.14.1
-
cpe:2.3:a:apache:struts:2.5.2
-
cpe:2.3:a:apache:struts:2.5.3
-
cpe:2.3:a:apache:struts:2.5.4
-
cpe:2.3:a:apache:struts:2.5.5
-
cpe:2.3:a:apache:struts:2.5.6
-
cpe:2.3:a:apache:struts:2.5.7
-
cpe:2.3:a:apache:struts:2.5.8
-
cpe:2.3:a:apache:struts:2.5.9