CVE-2012-4386

The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
apachestruts
2.0.0
apachestruts
2.0.1
apachestruts
2.0.2
apachestruts
2.0.3
apachestruts
2.0.4
apachestruts
2.0.5
apachestruts
2.0.6
apachestruts
2.0.7
apachestruts
2.0.8
apachestruts
2.0.9
apachestruts
2.0.10
apachestruts
2.0.11
apachestruts
2.0.11.1
apachestruts
2.0.11.2
apachestruts
2.0.12
apachestruts
2.0.13
apachestruts
2.0.14
apachestruts
2.1.0
apachestruts
2.1.1
apachestruts
2.1.2
apachestruts
2.1.3
apachestruts
2.1.4
apachestruts
2.1.5
apachestruts
2.1.6
apachestruts
2.1.8
apachestruts
2.1.8.1
apachestruts
2.2.1
apachestruts
2.2.1.1
apachestruts
2.2.3
apachestruts
2.2.3.1
apachestruts
2.3.1
apachestruts
2.3.1.1
apachestruts
2.3.1.2
apachestruts
2.3.3
apachestruts
2.3.4
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libstruts1.2-java
precise
not-affected
oneiric
not-affected
natty
not-affected
lucid
not-affected
hardy
not-affected