The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 06 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 14 Aug 2024 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2017-07-10T16:00:00.000Z
Updated: 2025-10-21T23:55:38.964Z
Reserved: 2017-06-21T00:00:00.000Z
Link: CVE-2017-9791
Updated: 2024-08-05T17:18:01.919Z
Status : Deferred
Published: 2017-07-10T16:29:00.277
Modified: 2025-10-22T00:16:12.670
Link: CVE-2017-9791