CrowdSec
5/10CrowdSec Score

Apache Struts2 - RCE (CVE-2012-0392)

Published on08-01-2012
First seen on23-11-2024

0Exploiting IPs reported

The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.

CrowdSec analysis

CVE-2012-0392 is a vulnerability in Apache Struts, where the CookieInterceptor component can allow remote attackers to execute arbitrary commands due to inadequate parameter filtering, leading to potential Java code execution.

CrowdSec has been tracking this vulnerability and its exploits since 10th of March 2025.

CrowdSec network data shows that most actors exploiting CVE-2012-0392 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. CrowdSec data also reveals a clear uptick in attacks involving CVE-2012-0392 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.

The vulnerability is being leveraged through carefully crafted requests, mainly targeting URLs containing /devmode.action alongside parameters that enable debug command execution.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.