CVE-2016-3081 (CNNVD-201604-585)

HIGH 有利用代码
中文标题:
Apache Struts 命令注入漏洞
英文标题:
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invo...
CVSS分数: 8.1
发布时间: 2016-04-26 14:00:00
漏洞类型: 命令注入
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Apache Struts是美国阿帕奇(Apache)软件基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。 Apache Struts 2中存在命令注入漏洞。当程序启用Dynamic Method Invocation时,远程攻击者可借助method:前缀利用该漏洞在服务器端执行任意代码。以下版本受到影响:Apache Struts 2.3.20.2之前2.x版本,2.3.24.2之前2.3.24.x版本,2.3.28.1之前2.3.28.x版本。

英文描述:

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.

CWE类型:
CWE-77
标签:
remote linux Metasploit
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apache struts 2.0.0 - - cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
apache struts 2.0.1 - - cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*
apache struts 2.0.2 - - cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*
apache struts 2.0.3 - - cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*
apache struts 2.0.4 - - cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*
apache struts 2.0.5 - - cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*
apache struts 2.0.6 - - cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*
apache struts 2.0.7 - - cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*
apache struts 2.0.8 - - cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*
apache struts 2.0.9 - - cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*
apache struts 2.0.10 - - cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*
apache struts 2.0.11 - - cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*
apache struts 2.0.11.1 - - cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*
apache struts 2.0.11.2 - - cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*
apache struts 2.0.12 - - cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*
apache struts 2.0.13 - - cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*
apache struts 2.0.14 - - cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*
apache struts 2.1.0 - - cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*
apache struts 2.1.1 - - cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*
apache struts 2.1.2 - - cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*
apache struts 2.1.3 - - cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*
apache struts 2.1.4 - - cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*
apache struts 2.1.5 - - cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*
apache struts 2.1.6 - - cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*
apache struts 2.1.8 - - cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*
apache struts 2.1.8.1 - - cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*
apache struts 2.2.1 - - cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*
apache struts 2.2.1.1 - - cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*
apache struts 2.2.3 - - cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*
apache struts 2.2.3.1 - - cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*
apache struts 2.3.1 - - cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*
apache struts 2.3.1.1 - - cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*
apache struts 2.3.1.2 - - cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*
apache struts 2.3.3 - - cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*
apache struts 2.3.4 - - cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*
apache struts 2.3.4.1 - - cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*
apache struts 2.3.7 - - cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*
apache struts 2.3.8 - - cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*
apache struts 2.3.12 - - cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*
apache struts 2.3.14 - - cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*
apache struts 2.3.14.1 - - cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*
apache struts 2.3.14.2 - - cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*
apache struts 2.3.14.3 - - cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*
apache struts 2.3.15 - - cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*
apache struts 2.3.15.1 - - cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*
apache struts 2.3.15.2 - - cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*
apache struts 2.3.15.3 - - cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*
apache struts 2.3.16 - - cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*
apache struts 2.3.16.1 - - cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*
apache struts 2.3.16.2 - - cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*
apache struts 2.3.16.3 - - cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*
apache struts 2.3.20 - - cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*
apache struts 2.3.20.1 - - cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*
apache struts 2.3.24 - - cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*
apache struts 2.3.24.1 - - cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*
apache struts 2.3.28 - - cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*
oracle siebel_e-billing 7.1 - - cpe:2.3:a:oracle:siebel_e-billing:7.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1035665 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
39756 exploit
cve.org
访问
91787 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
87327 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
ExploitDB EDB-39756 EXPLOIT
exploitdb
访问
Download Exploit EDB-39756 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2016-3081 ADVISORY
cve.org
访问
CVSS评分详情
8.1
HIGH
CVSS向量: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS版本: 3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2016-04-26 14:00:00
修改时间:
2024-08-05 23:40:15
创建时间:
2025-11-11 15:34:17
更新时间:
2025-11-11 16:39:02
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2016-3081 2025-11-11 15:19:07 2025-11-11 07:34:17
NVD nvd_CVE-2016-3081 2025-11-11 14:55:07 2025-11-11 07:42:58
CNNVD cnnvd_CNNVD-201604-585 2025-11-11 15:09:40 2025-11-11 07:52:27
EXPLOITDB exploitdb_EDB-39756 2025-11-11 15:05:25 2025-11-11 08:39:02
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:39:02
references_count: 11 → 14; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 11 -> 14
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:52:27
vulnerability_type: 未提取 → 命令注入; cnnvd_id: 未提取 → CNNVD-201604-585; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 命令注入
  • cnnvd_id: 未提取 -> CNNVD-201604-585
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:58
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 8.1; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 57; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 8.1
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 57
  • data_sources: ['cve'] -> ['cve', 'nvd']