XStream Library Vulnerability in Apache Struts REST Plugin
CVE-2018-1327
7.5HIGH
Summary
The Apache Struts REST Plugin leverages the XStream library, which is vulnerable to a Denial of Service (DoS) attack when manipulated by a malicious request containing a specially crafted XML payload. Attackers can exploit this vulnerability to disrupt the application’s availability. To mitigate this risk, users are advised to upgrade to Apache Struts version 2.5.16 or later, and implement the optional Jackson XML handler as outlined in the Apache Struts documentation. Alternatively, a custom XML handler can be created based on the Jackson XML handler included in version 2.5.16.
Affected Version(s)
Apache Struts Apache Struts 2.1.1 to 2.5.14.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved