VYPR
High severity7.5NVD Advisory· Published Sep 20, 2017· Updated May 13, 2026

CVE-2017-9793

CVE-2017-9793

Description

The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.struts:struts2-rest-pluginMaven
< 2.3.342.3.34
org.apache.struts:struts2-rest-pluginMaven
>= 2.5.0, < 2.5.132.5.13

Affected products

56
  • Apache/Struts55 versions
    cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*+ 54 more
    • cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.32:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.33:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5:beta1:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5:beta2:*:*:*:*:*:*
    • cpe:2.3:a:apache:struts:2.5:beta3:*:*:*:*:*:*
  • Apache Software Foundation/Apache Strutsv5
    Range: 2.3.7 - 2.3.33

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.