Closed mend-for-github-com[bot] closed 2 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
CVE-2016-4003 - Medium Severity Vulnerability
Vulnerable Library - struts2-core-2.3.20.jar
Apache Struts 2
Path to dependency file: easybuggy-private/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/struts/struts2-core/2.3.20/struts2-core-2.3.20.jar
Dependency Hierarchy: - vulnpackage-1.0.jar (Root Library) - struts2-rest-plugin-2.3.20.jar - :x: **struts2-core-2.3.20.jar** (Vulnerable Library)
Found in HEAD commit: 6ef2566cb8b39d29f6b8b76a1bd3860df7fac401
Found in base branch: master
Vulnerability Details
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter.
Publish Date: 2016-04-12
URL: CVE-2016-4003
CVSS 3 Score Details (6.1)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/apache/struts/tree/STRUTS_2_3_28/
Release Date: 2016-04-12
Fix Resolution: org.apache.struts:struts2-core:2.3.28