CVE-2016-3081 (CNNVD-201604-585)
HIGH
有利用代码
中文标题:
Apache Struts 命令注入漏洞
英文标题:
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invo...
CVSS分数:
8.1
发布时间:
2016-04-26 14:00:00
漏洞类型:
命令注入
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v4
漏洞描述
中文描述:
Apache Struts是美国阿帕奇(Apache)软件基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。 Apache Struts 2中存在命令注入漏洞。当程序启用Dynamic Method Invocation时,远程攻击者可借助method:前缀利用该漏洞在服务器端执行任意代码。以下版本受到影响:Apache Struts 2.3.20.2之前2.x版本,2.3.24.2之前2.3.24.x版本,2.3.28.1之前2.3.28.x版本。
英文描述:
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.
CWE类型:
CWE-77
标签:
remote
linux
Metasploit
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apache | struts | 2.0.0 | - | - |
cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
|
| apache | struts | 2.0.1 | - | - |
cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*
|
| apache | struts | 2.0.2 | - | - |
cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*
|
| apache | struts | 2.0.3 | - | - |
cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*
|
| apache | struts | 2.0.4 | - | - |
cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*
|
| apache | struts | 2.0.5 | - | - |
cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*
|
| apache | struts | 2.0.6 | - | - |
cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*
|
| apache | struts | 2.0.7 | - | - |
cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*
|
| apache | struts | 2.0.8 | - | - |
cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*
|
| apache | struts | 2.0.9 | - | - |
cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*
|
| apache | struts | 2.0.10 | - | - |
cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*
|
| apache | struts | 2.0.11 | - | - |
cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*
|
| apache | struts | 2.0.11.1 | - | - |
cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*
|
| apache | struts | 2.0.11.2 | - | - |
cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*
|
| apache | struts | 2.0.12 | - | - |
cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*
|
| apache | struts | 2.0.13 | - | - |
cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*
|
| apache | struts | 2.0.14 | - | - |
cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*
|
| apache | struts | 2.1.0 | - | - |
cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*
|
| apache | struts | 2.1.1 | - | - |
cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*
|
| apache | struts | 2.1.2 | - | - |
cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*
|
| apache | struts | 2.1.3 | - | - |
cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*
|
| apache | struts | 2.1.4 | - | - |
cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*
|
| apache | struts | 2.1.5 | - | - |
cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*
|
| apache | struts | 2.1.6 | - | - |
cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*
|
| apache | struts | 2.1.8 | - | - |
cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*
|
| apache | struts | 2.1.8.1 | - | - |
cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
|
| apache | struts | 2.2.1 | - | - |
cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*
|
| apache | struts | 2.2.1.1 | - | - |
cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
|
| apache | struts | 2.2.3 | - | - |
cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*
|
| apache | struts | 2.2.3.1 | - | - |
cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.1 | - | - |
cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.1.1 | - | - |
cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.1.2 | - | - |
cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
|
| apache | struts | 2.3.3 | - | - |
cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*
|
| apache | struts | 2.3.4 | - | - |
cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*
|
| apache | struts | 2.3.4.1 | - | - |
cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.7 | - | - |
cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*
|
| apache | struts | 2.3.8 | - | - |
cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*
|
| apache | struts | 2.3.12 | - | - |
cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*
|
| apache | struts | 2.3.14 | - | - |
cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*
|
| apache | struts | 2.3.14.1 | - | - |
cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.14.2 | - | - |
cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
|
| apache | struts | 2.3.14.3 | - | - |
cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
|
| apache | struts | 2.3.15 | - | - |
cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*
|
| apache | struts | 2.3.15.1 | - | - |
cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.15.2 | - | - |
cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
|
| apache | struts | 2.3.15.3 | - | - |
cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
|
| apache | struts | 2.3.16 | - | - |
cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*
|
| apache | struts | 2.3.16.1 | - | - |
cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.16.2 | - | - |
cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
|
| apache | struts | 2.3.16.3 | - | - |
cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
|
| apache | struts | 2.3.20 | - | - |
cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
|
| apache | struts | 2.3.20.1 | - | - |
cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.24 | - | - |
cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
|
| apache | struts | 2.3.24.1 | - | - |
cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
|
| apache | struts | 2.3.28 | - | - |
cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
|
| oracle | siebel_e-billing | 7.1 | - | - |
cpe:2.3:a:oracle:siebel_e-billing:7.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1035665
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
39756
exploit
cve.org
访问
cve.org
91787
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
87327
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
ExploitDB EDB-39756
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-39756
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2016-3081
ADVISORY
cve.org
访问
cve.org
CVSS评分详情
8.1
HIGH
CVSS向量:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS版本:
3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2016-04-26 14:00:00
修改时间:
2024-08-05 23:40:15
创建时间:
2025-11-11 15:34:17
更新时间:
2025-11-11 16:39:02
利用信息
此漏洞有可利用代码!
利用代码数量:
1
利用来源:
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-3081 |
2025-11-11 15:19:07 | 2025-11-11 07:34:17 |
| NVD | nvd_CVE-2016-3081 |
2025-11-11 14:55:07 | 2025-11-11 07:42:58 |
| CNNVD | cnnvd_CNNVD-201604-585 |
2025-11-11 15:09:40 | 2025-11-11 07:52:27 |
| EXPLOITDB | exploitdb_EDB-39756 |
2025-11-11 15:05:25 | 2025-11-11 08:39:02 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4
EXPLOITDB
2025-11-11 16:39:02
references_count: 11 → 14; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 11 -> 14
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:52:27
vulnerability_type: 未提取 → 命令注入; cnnvd_id: 未提取 → CNNVD-201604-585; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 命令注入
- cnnvd_id: 未提取 -> CNNVD-201604-585
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:42:58
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 8.1; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 57; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 8.1
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 57
- data_sources: ['cve'] -> ['cve', 'nvd']