SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Identity Services Engine Vendors:   Cisco
(Cisco Issues Fix for Cisco Identity Services Engine) Apache Struts Bugs Permit Remote Code Execution and URL Redirection Attacks
SecurityTracker Alert ID:  1033813
SecurityTracker URL:  http://securitytracker.com/id/1033813
CVE Reference:   CVE-2013-2251   (Links to External Site)
Date:  Oct 15 2015
Impact:   Disclosure of system information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Two vulnerabilities were reported in Apache Struts. A remote user can execute arbitrary code on the target system. A remote user can conduct URL redirection attacks. Cisco Identity Services Engine is affected.

A remote user can submit a URL with specially crafted 'action:', 'redirect:' or 'redirectAction:' parameter values to cause the system to evaluate the values as an OGNL expression and potentially execute arbitrary code on the target system [CVE-2013-2251].

A demonstration exploit URL is provided:

http://[target]/struts2-blank/example/X.action?action:%25{(new+java.lang.ProcessBuilder(new+java.lang.String[]{'command','goes','here'})).start()}

A remote user can create a URL with specially crafted 'redirect:' or 'redirectAction:' parameter values that, when loaded by the target user, will redirect the target user's browser to an arbitrary site [CVE-2013-2248].

A demonstration exploit URL is provided:

http://[target]/struts2-showcase/fileupload/upload.action?redirect:http://[attacker]/

Takeshi Terada of Mitsui Bussan Secure Directions, Inc. reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can conduct URL redirection attacks.

Solution:   The vendor has issued a fix for CVE-2013-2251 for Cisco Identity Services Engine (1.0.4.573-6, 1.1.0.665-4, 1.1.1.268-6, 1.1.2.145-9, 1.1.3.124-4, 1.1.4.218-4, 1.2.0.899).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 (Links to External Site)
Cause:   Input validation error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 1 2013 Apache Struts Bugs Permit Remote Code Execution and URL Redirection Attacks



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC