6.8

CVE-2012-4386

The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.

Data is provided by the National Vulnerability Database (NVD)
ApacheStruts Version2.0.0
ApacheStruts Version2.0.1
ApacheStruts Version2.0.2
ApacheStruts Version2.0.3
ApacheStruts Version2.0.4
ApacheStruts Version2.0.5
ApacheStruts Version2.0.6
ApacheStruts Version2.0.7
ApacheStruts Version2.0.8
ApacheStruts Version2.0.9
ApacheStruts Version2.0.10
ApacheStruts Version2.0.11
ApacheStruts Version2.0.11.1
ApacheStruts Version2.0.11.2
ApacheStruts Version2.0.12
ApacheStruts Version2.0.13
ApacheStruts Version2.0.14
ApacheStruts Version2.1.0
ApacheStruts Version2.1.1
ApacheStruts Version2.1.2
ApacheStruts Version2.1.3
ApacheStruts Version2.1.4
ApacheStruts Version2.1.5
ApacheStruts Version2.1.6
ApacheStruts Version2.1.8
ApacheStruts Version2.1.8.1
ApacheStruts Version2.2.1
ApacheStruts Version2.2.1.1
ApacheStruts Version2.2.3
ApacheStruts Version2.2.3.1
ApacheStruts Version2.3.1
ApacheStruts Version2.3.1.1
ApacheStruts Version2.3.1.2
ApacheStruts Version2.3.3
ApacheStruts Version2.3.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.24% 0.866
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.