![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.108771 |
Categoría: | Huawei |
Título: | Huawei Data Communication: Apache Struts2 RCE Vulnerability in Huawei Products (huawei-sa-20170316-01-struts2) |
Resumen: | Apache Struts2 released a remote code execution (RCE); vulnerability in S2-045 on the official website.;; This VT has been deprecated and is therefore no longer functional. |
Descripción: | Summary: Apache Struts2 released a remote code execution (RCE) vulnerability in S2-045 on the official website. This VT has been deprecated and is therefore no longer functional. Vulnerability Insight: Apache Struts2 released a remote code execution vulnerability in S2-045 on the official website. An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. (Vulnerability ID: HWPSIRT-2017-03094)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2017-5638.Huawei has released software updates to fix this vulnerability. This advisory is available in the linked references. Vulnerability Impact: An attacker is possible to perform a RCE (Remote Code Execution) attack with a malicious Content-Type value. Affected Software/OS: AAA versions V300R003C30 V500R005C00 V500R005C10 V500R005C11 V500R005C12 AnyOffice versions 2.5.0302.0201T 2.5.0501.0290 iManager NetEco 6000 versions V600R007C91 Solution: See the referenced vendor advisory for a solution. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5638 BugTraq ID: 96729 http://www.securityfocus.com/bid/96729 CERT/CC vulnerability note: VU#834067 https://www.kb.cert.org/vuls/id/834067 https://exploit-db.com/exploits/41570 https://www.exploit-db.com/exploits/41614/ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/ https://github.com/mazen160/struts-pwn https://github.com/rapid7/metasploit-framework/issues/8064 https://isc.sans.edu/diary/22169 https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt https://twitter.com/theog150/status/841146956135124993 https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/ https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E http://www.securitytracker.com/id/1037973 |
Copyright | Copyright (C) 2020 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |