CVE-2014-0114 commons-beanutils
Metadata
![]() |
|
high | |
7.5 | |
commons-beanutils | |
CVE-2014-0114 | |
2017-12-30 18:14 | |
![]() ![]() ![]() |
|
2017-12-29 22:25 2017-06-18 07:41 2017-06-16 19:08 2017-04-01 19:34 2017-01-05 17:45 |
Description
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
Am I vulnerable?
The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.
Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.
Sign up for monitoringAffected package information |
Release | Package | Patched in |
---|---|---|
buster | commons-beanutils |
1.9.2-1
|
jessie | commons-beanutils |
1.9.2-1
|
sid | commons-beanutils |
1.9.2-1
|
stretch | commons-beanutils |
1.9.2-1
|
wheezy | commons-beanutils | None |