Summary #

Netsparker identified a code evaluation (Apache Struts) which occurs when using an unintentional expression in Freemarker tag instead of string literals.

This is a highly critical issue and should be addressed as soon as possible.

Impact #
An attacker can execute arbitrary code by using wrong construction in Freemarker tags. The attacker may also be able to execute arbitrary system commands.
Actions To Take #
Update your Struts framework version to latest version.
Remediation #
Do not accept input from end users which will be directly interpreted as source code. If this is a business requirement, validate all input to the application by removing any data that could be directly interpreted as code.
Required Skills for Successful Exploitation #
This vulnerability is not difficult to leverage. There are vast resources available about FreeMarker tags. Successful exploitation requires knowledge of the programming language, access to or the ability to produce source code for use in such attacks, and minimal attack skills.
Classifications #
PCI v3.1-6.5.1; PCI v3.2-6.5.1; CAPEC-23; CWE-94; HIPAA-164.306(a), 164.308(a); ISO27001-A.14.2.5; OWASP 2013-A1; OWASP 2017-A1 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities


Search Vulnerability


Dead accurate, fast & easy-to-use Web Application Security Scanner

Get a demo