CVE-2012-4386

EUVD-2022-2048
The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
CSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
apachestruts
2.0.0
apachestruts
2.0.1
apachestruts
2.0.2
apachestruts
2.0.3
apachestruts
2.0.4
apachestruts
2.0.5
apachestruts
2.0.6
apachestruts
2.0.7
apachestruts
2.0.8
apachestruts
2.0.9
apachestruts
2.0.10
apachestruts
2.0.11
apachestruts
2.0.11.1
apachestruts
2.0.11.2
apachestruts
2.0.12
apachestruts
2.0.13
apachestruts
2.0.14
apachestruts
2.1.0
apachestruts
2.1.1
apachestruts
2.1.2
apachestruts
2.1.3
apachestruts
2.1.4
apachestruts
2.1.5
apachestruts
2.1.6
apachestruts
2.1.8
apachestruts
2.1.8.1
apachestruts
2.2.1
apachestruts
2.2.1.1
apachestruts
2.2.3
apachestruts
2.2.3.1
apachestruts
2.3.1
apachestruts
2.3.1.1
apachestruts
2.3.1.2
apachestruts
2.3.3
apachestruts
2.3.4
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libstruts1.2-java
hardy
not-affected
lucid
not-affected
natty
not-affected
oneiric
not-affected
precise
not-affected