{
  "threat_severity" : "Important",
  "public_date" : "2014-04-29T00:00:00Z",
  "bugzilla" : {
    "description" : "1: Class Loader manipulation via request parameters",
    "id" : "1091938",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1091938"
  },
  "cvss" : {
    "cvss_base_score" : "7.5",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-470",
  "details" : [ "Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to \"manipulate\" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1." ],
  "statement" : "This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. The impact of this depends on which ClassLoader properties are exposed. Exploits that lead to remote code execution have been published. These exploits rely on ClassLoader properties that are exposed on Tomcat 8, which is not included in any supported Red Hat products. However, some Red Hat products that ship Struts 1 do expose ClassLoader properties that could potentially be exploited. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/869353",
  "affected_release" : [ {
    "product_name" : "Fuse ESB Enterprise 7.1.0",
    "release_date" : "2014-05-14T00:00:00Z",
    "advisory" : "RHSA-2014:0498",
    "cpe" : "cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
  }, {
    "product_name" : "Red Hat AMQ Broker 7",
    "release_date" : "2019-10-10T00:00:00Z",
    "advisory" : "RHSA-2019:2995",
    "cpe" : "cpe:/a:redhat:amq_broker:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2014-05-07T00:00:00Z",
    "advisory" : "RHSA-2014:0474",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "struts-0:1.2.9-4jpp.8.el5_10"
  }, {
    "product_name" : "Red Hat JBoss Fuse 6.1",
    "release_date" : "2014-05-14T00:00:00Z",
    "advisory" : "RHSA-2014:0497",
    "cpe" : "cpe:/a:redhat:jboss_fuse:6.1.0"
  }, {
    "product_name" : "Red Hat JBoss Fuse 7",
    "release_date" : "2018-09-11T00:00:00Z",
    "advisory" : "RHSA-2018:2669",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat JBoss Operations Network 3.2",
    "release_date" : "2014-05-15T00:00:00Z",
    "advisory" : "RHSA-2014:0511",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3.2.1"
  }, {
    "product_name" : "Red Hat Network Satellite Server v 5.4",
    "release_date" : "2014-05-14T00:00:00Z",
    "advisory" : "RHSA-2014:0500",
    "cpe" : "cpe:/a:redhat:network_satellite:5.4::el6",
    "package" : "struts-0:1.3.10-6.ep5.el6"
  }, {
    "product_name" : "Red Hat Network Satellite Server v 5.5",
    "release_date" : "2014-05-14T00:00:00Z",
    "advisory" : "RHSA-2014:0500",
    "cpe" : "cpe:/a:redhat:network_satellite:5.5::el6",
    "package" : "struts-0:1.3.10-6.ep5.el6"
  }, {
    "product_name" : "Red Hat Satellite 5.6",
    "release_date" : "2014-05-14T00:00:00Z",
    "advisory" : "RHSA-2014:0500",
    "cpe" : "cpe:/a:redhat:network_satellite:5.6::el6",
    "package" : "struts-0:1.3.10-6.ep5.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat AMQ Broker 7",
    "fix_state" : "Affected",
    "package_name" : "beanutils",
    "cpe" : "cpe:/a:redhat:amq_broker:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1",
    "fix_state" : "Will not fix",
    "package_name" : "struts",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1"
  }, {
    "product_name" : "Red Hat JBoss Operations Network 3",
    "fix_state" : "Affected",
    "package_name" : "struts",
    "cpe" : "cpe:/a:redhat:jboss_operations_network:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-0114\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-0114" ],
  "name" : "CVE-2014-0114",
  "mitigation" : {
    "value" : "http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.VCaGk3V53Ua",
    "lang" : "en:us"
  },
  "csaw" : false
}