logo

CVE-2012-4386 org.apache.struts:struts2-core

Package

Manager: maven
Name: org.apache.struts:struts2-core
Vulnerable Version: >=2.0.0 <2.3.4.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N

EPSS: 0.08301 pctl0.91924

Details

Cross-Site Request Forgery in Apache Struts The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.

Metadata

Created: 2022-05-17T01:42:17Z
Modified: 2022-11-03T19:12:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2rvh-q539-q33v/GHSA-2rvh-q539-q33v.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-2rvh-q539-q33v
Finding: F007
Auto approve: 1