INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h Global data_breach Government CRITICAL 4h Global ransomware Financial Services / Cybersecurity CRITICAL 4h Global vulnerability Information Technology / Cybersecurity CRITICAL 6h Global malware Energy and Utilities CRITICAL 7h Global ransomware Multiple sectors CRITICAL 7h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 10h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 10h Global phishing Multiple sectors HIGH 10h Global insider Cybersecurity Services CRITICAL 11h Global ransomware Multiple sectors (U.S. companies) CRITICAL 11h
Vulnerabilities

CVE-2017-9791

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Apache Struts 1 Improper Input Validation Vulnerability — The Struts 1 plugin in Apache Struts might allow remote code execution via a malicious field value passed in a raw message to the ActionMessag
Published: Feb 10, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Apache Struts 1 Improper Input Validation Vulnerability — The Struts 1 plugin in Apache Struts might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.

🤖 AI Executive Summary

CVE-2017-9791 is a critical remote code execution vulnerability in the Apache Struts 1 plugin for Apache Struts 2, caused by improper input validation when processing ActionMessage with raw user-supplied data. With a CVSS score of 9.0 and publicly available exploits, this vulnerability allows unauthenticated attackers to execute arbitrary code on affected servers. Given that Apache Struts is widely deployed in enterprise web applications, this poses an immediate and severe threat to organizations that have not patched or migrated away from Struts 1 plugin usage.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 9, 2026 04:38
🇸🇦 Saudi Arabia Impact Assessment
هذه الثغرة تؤثر بشكل كبير على القطاعات السعودية التي تعتمد على تطبيقات ويب مبنية على Java/Struts. القطاع المصرفي (المنظم من قبل ساما) والقطاع الحكومي (المنظم من قبل الهيئة الوطنية للأمن السيبراني) هما الأكثر عرضة للخطر، حيث تستخدم العديد من البوابات الإلكترونية الحكومية والأنظمة المصرفية الإلكترونية إطار عمل Struts. قطاع الطاقة (أرامكو وشركات البتروكيماويات) وقطاع الاتصالات (STC, Mobily, Zain) معرضون أيضاً بسبب استخدام تطبيقات ويب مؤسسية قائمة على Java. الأنظمة القديمة التي لا تزال تستخدم Struts 1 plugin شائعة في المؤسسات السعودية الكبيرة.
🏢 Affected Saudi Sectors
Banking Government Energy Telecommunications Healthcare E-commerce Education
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all applications using Apache Struts with the Struts 1 plugin by scanning web application servers for struts2-struts1-plugin JAR files.
2. If the Struts 1 plugin is not required, remove it immediately from all deployments.
3. Apply the latest Apache Struts patches — upgrade to Struts 2.5.12 or later which addresses this vulnerability.

Compensating Controls:
4. Implement Web Application Firewall (WAF) rules to detect and block malicious payloads targeting Struts ActionMessage parameters.
5. Restrict network access to Struts-based applications using network segmentation and firewall rules.
6. Enable input validation and sanitization at the application level for all user-supplied data.

Detection Rules:
7. Monitor for unusual process execution on web application servers (e.g., cmd.exe, /bin/sh spawned by Java processes).
8. Deploy IDS/IPS signatures for known Struts exploitation patterns.
9. Review web server logs for anomalous POST requests with OGNL expressions or suspicious ActionMessage parameters.
10. Consider migrating legacy Struts 1 applications to modern frameworks as a long-term strategy.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع التطبيقات التي تستخدم Apache Struts مع إضافة Struts 1 عن طريق فحص خوادم تطبيقات الويب بحثاً عن ملفات struts2-struts1-plugin JAR.
2. إذا لم تكن إضافة Struts 1 مطلوبة، قم بإزالتها فوراً من جميع عمليات النشر.
3. تطبيق أحدث تصحيحات Apache Struts — الترقية إلى Struts 2.5.12 أو أحدث.

الضوابط التعويضية:
4. تنفيذ قواعد جدار حماية تطبيقات الويب (WAF) لاكتشاف وحظر الحمولات الضارة التي تستهدف معلمات Struts ActionMessage.
5. تقييد الوصول الشبكي إلى التطبيقات المبنية على Struts باستخدام تجزئة الشبكة وقواعد جدار الحماية.
6. تفعيل التحقق من المدخلات وتنقيتها على مستوى التطبيق لجميع البيانات المقدمة من المستخدم.

قواعد الكشف:
7. مراقبة تنفيذ العمليات غير المعتادة على خوادم تطبيقات الويب.
8. نشر توقيعات IDS/IPS لأنماط استغلال Struts المعروفة.
9. مراجعة سجلات خادم الويب بحثاً عن طلبات POST غير طبيعية تحتوي على تعبيرات OGNL.
10. النظر في ترحيل تطبيقات Struts 1 القديمة إلى أطر عمل حديثة كاستراتيجية طويلة المدى.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Vulnerability Management) ECC-2:3-4 (Patch Management) ECC-2:2-1 (Web Application Security) ECC-2:5-2 (Network Security)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.5 (Vulnerability Management) 3.4.1 (Application Security) 3.3.7 (Secure Configuration)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.25 (Secure development lifecycle) A.8.26 (Application security requirements)
🟣 PCI DSS v4.0
6.3.3 (Patching critical vulnerabilities) 6.4 (Web application firewall) 6.2 (System components protected from known vulnerabilities) 11.3 (Penetration testing)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Apache:Struts 1
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.24%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-08-10
Published 2022-02-10
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.