VYPR
High severity7.5NVD Advisory· Published Jul 13, 2017· Updated May 13, 2026

CVE-2017-9787

CVE-2017-9787

Description

When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.struts:struts2-coreMaven
>= 2.3.7, < 2.3.332.3.33
org.apache.struts:struts2-coreMaven
>= 2.5.0, < 2.5.122.5.12

Affected products

54
  • Apache/Struts53 versions
    cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*+ 52 more
    • cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*
  • Apache Software Foundation/Apache Strutsv5
    Range: 2.3.x prior to 2.3.33

Patches

2

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

16

News mentions

0

No linked articles in our index yet.