Child pages
  • S2-042
Skip to end of metadata
Go to start of metadata

Summary

Possible path traversal in the Convention plugin

Who should read this

All Struts 2 developers and users

Impact of vulnerability

Possible path traversal in the Convention plugin in Struts 2.3.20 - 2.3.30

Maximum security rating

High

Recommendation

Upgrade to Struts 2.3.31 or to any version of Struts 2.5

Affected Software

Struts 2.3.20 - Struts 2.3.30

Reporter

Takeshi Terada of Mitsui Bussan Secure Directions, Inc.

CVE Identifier

CVE-2016-6795

Problem

It is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.

Solution

Upgrade to Apache Struts version 2.3.31 when you are using Struts 2.3.20 - 2.3.30 with the Convention plugin.

Backward compatibility

No backward incompatibility issues are expected.

Workaround

There is no known workaround for this vulnerability, please upgrade to the mentioned Struts versions.

 

  • No labels