CVE-2017-7672:
Apache Struts Improper Input Validation vulnerability
5.9
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/16/2018
Updated
1/4/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.struts:struts2-core | maven | >= 2.5.0, < 2.5.12 | 2.5.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies the built-in URLValidator as the source of improper input validation. The Struts S2-047 advisory confirms that the default regex in URLValidator is flawed, and the solution involves upgrading to a version with a patched regex. The validate method in the URLValidator class is directly responsible for applying the vulnerable regex pattern, making it the clear entry point for this ReDoS vulnerability. The high confidence stems from the direct correlation between the advisory's workaround (regex replacement) and the function's role in validation.