Home > Security Bulletins > S2-020 |
Who should read this | All Struts 2 developers and users |
---|---|
Impact of vulnerability | DoS attacks and ClassLoader manipulation |
Maximum security rating | Important |
Recommendation | Developers should immediately upgrade to Struts 2.3.16.1 |
Affected Software | Struts 2.0.0 - Struts 2.3.16 |
Reporter | Mark Thomas (markt at apache.org),Przemysław Celej (p-celej at o2.pl) |
CVE Identifier |
|
Default upload mechanism in Apache Struts 2 based on Commons FileUpload version 1.3 which is vulnerable and allows DoS attacks. Additional ParametersInterceptor allows access to class parameter which is directly mapped to getClass() method and allows ClassLoader manipulation.
In Struts 2.3.16.1, Commons FileUpload was updated to version 1.3.1 and "class" was added to excludeParams in struts-defaul.xml configuration of ParametersInterceptor.