logo

CVE-2014-0114 commons-beanutils:commons-beanutils

Package

Manager: maven
Name: commons-beanutils:commons-beanutils
Vulnerable Version: >=1.8.0 <1.9.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.92315 pctl0.99714

Details

Arbitrary code execution in Apache Commons BeanUtils Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Metadata

Created: 2020-06-10T23:38:01Z
Modified: 2024-06-05T15:57:09Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/06/GHSA-p66x-2cv9-qq3v/GHSA-p66x-2cv9-qq3v.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-p66x-2cv9-qq3v
Finding: F184
Auto approve: 1