CVE-2014-0114

N/A Unknown
Published: April 30, 2014 Modified: May 06, 2026
View on NVD

Description

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/57477
Source: secalert@redhat.com
http://secunia.com/advisories/58710
Source: secalert@redhat.com
http://secunia.com/advisories/58851
Source: secalert@redhat.com
http://secunia.com/advisories/58947
Source: secalert@redhat.com
http://secunia.com/advisories/59014
Source: secalert@redhat.com
http://secunia.com/advisories/59118
Source: secalert@redhat.com
http://secunia.com/advisories/59228
Source: secalert@redhat.com
http://secunia.com/advisories/59245
Source: secalert@redhat.com
http://secunia.com/advisories/59246
Source: secalert@redhat.com
http://secunia.com/advisories/59430
Source: secalert@redhat.com
http://secunia.com/advisories/59464
Source: secalert@redhat.com
http://secunia.com/advisories/59479
Source: secalert@redhat.com
http://secunia.com/advisories/59480
Source: secalert@redhat.com
http://secunia.com/advisories/59704
Source: secalert@redhat.com
http://secunia.com/advisories/59718
Source: secalert@redhat.com
http://secunia.com/advisories/60177
Source: secalert@redhat.com
http://secunia.com/advisories/60703
Source: secalert@redhat.com
http://www.securityfocus.com/bid/67121
Source: secalert@redhat.com
http://advisories.mageia.org/MGASA-2014-0219.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=140119284401582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=140801096002766&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=141451023707502&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://openwall.com/lists/oss-security/2014/06/15/10
Source: af854a3a-2127-422b-91ae-364da2661108
http://openwall.com/lists/oss-security/2014/07/08/1
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/fulldisclosure/2014/Dec/23
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/57477
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/58710
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/58851
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/58947
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59014
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59118
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59228
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59245
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59246
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59430
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59464
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59479
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59480
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59704
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/59718
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/60177
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/60703
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21674128
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21674812
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21675266
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21675387
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21675689
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21675898
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21675972
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21676091
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21676110
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21676303
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21676375
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21676931
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg21677110
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg27042296
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2014/dsa-2940
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ibm.com/support/docview.wss?uid=swg21675496
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2014:095
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/534161/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/67121
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2018:2669
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2019:2995
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/solutions/869353
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=1091938
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=1116665
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.apache.org/jira/browse/BEANUTILS-463
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/201607-09
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20140911-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20180629-0006/
Source: af854a3a-2127-422b-91ae-364da2661108

238 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
92.3%
100th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache