GHSA-p66x-2cv9-qq3v

Suggest an improvement
Source
https://github.com/advisories/GHSA-p66x-2cv9-qq3v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/06/GHSA-p66x-2cv9-qq3v/GHSA-p66x-2cv9-qq3v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-p66x-2cv9-qq3v
Aliases
Published
2020-06-10T23:38:01Z
Modified
2024-12-01T05:31:59.449737Z
Summary
Arbitrary code execution in Apache Commons BeanUtils
Details

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Database specific
{
    "nvd_published_at": "2014-04-30T10:49:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-10T23:37:42Z"
}
References

Affected packages

Maven / commons-beanutils:commons-beanutils

Package

Name
commons-beanutils:commons-beanutils
View open source insights on deps.dev
Purl
pkg:maven/commons-beanutils/commons-beanutils

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.8.0
Fixed
1.9.4

Affected versions

1.*

1.8.0
1.8.1
1.8.2
1.8.3
1.9.0
1.9.1
1.9.2
1.9.3