id: CVE-2010-1870 info: name: ListSERV Maestro <= 9.0-8 RCE author: b0yd severity: medium description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Upgrade to a patched version of ListSERV Maestro that is not affected by this vulnerability. reference: - https://www.securifera.com/advisories/sec-2020-0001/ - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt - https://www.exploit-db.com/exploits/14360 - http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16 - http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:P/A:N cvss-score: 5 cve-id: CVE-2010-1870 cwe-id: CWE-917 epss-score: 0.06174 epss-percentile: 0.92842 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 2 vendor: apache product: struts shodan-query: - http.html:"apache struts" - http.title:"struts2 showcase" - http.html:"struts problem report" fofa-query: - body="struts problem report" - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" tags: cve,cve2010,packetstorm,edb,rce,listserv,ognl,apache http: - method: GET path: - "{{BaseURL}}/lui/" - "{{BaseURL}}/hub/" extractors: - type: regex regex: - 'LISTSERV Maestro\s+9\.0-[123456780]' - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]' # digest: 490a004630440220011167dfff94820a6627ef47c2dc8c4e762e0a9a665ed00189fe142b7ad351f202207cc948bfc45395da792c6c5bd5e4c9cbf860f293155925e9e063de56ef236028:922c64590222798bb761d5b6d8e72950