Home > Security Bulletins > S2-020

Summary

Upgrade Commons FileUpload to version 1.3.1 (avoids DoS attacks) and adds 'class' to exclude params in ParametersInterceptor (avoid ClassLoader manipulation)

Who should read this

All Struts 2 developers and users

Impact of vulnerability

DoS attacks and ClassLoader manipulation

Maximum security rating

Important

Recommendation

Developers should immediately upgrade to Struts 2.3.16.1

Affected Software

Struts 2.0.0 - Struts 2.3.16

Reporter

Mark Thomas (markt at apache.org),Przemysław Celej (p-celej at o2.pl)

CVE Identifier

 

Problem

Default upload mechanism in Apache Struts 2 based on Commons FileUpload version 1.3 which is vulnerable and allows DoS attacks. Additional ParametersInterceptor allows access to class parameter which is directly mapped to getClass() method and allows ClassLoader manipulation.

Solution

In Struts 2.3.16.1, Commons FileUpload was updated to version 1.3.1 and "class" was added to excludeParams in struts-defaul.xml configuration of ParametersInterceptor.