CVE-2016-3082:
Remote Code Execution in Apache Struts
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97031%
CWE
Published
5/17/2022
Updated
12/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.struts:struts2-core | maven | < 2.3.20.3 | 2.3.20.3 |
org.apache.struts:struts2-core | maven | >= 2.3.24, < 2.3.24.3 | 2.3.24.3 |
org.apache.struts:struts2-core | maven | >= 2.3.28, < 2.3.28.1 | 2.3.28.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from XSLTResult's handling of stylesheet locations via request parameters. The advisory explicitly states XSLTResult's parameter injection flaw (CWE-20) allows remote code execution. The execute method would be responsible for processing the transformation using the user-supplied parameter. While exact line numbers aren't available, the class/method structure and vulnerability pattern match Struts' XSLTResult implementation.