Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Who should read this

All Struts 2 developers and users

Impact of vulnerability

Permissions, Privileges, and Access Controls

Maximum security rating

Important

Recommendation

Developers should immediately upgrade to Struts 2.3.15.23

Affected Software

Struts 2.0.0 - Struts 2.3.15.2

Reporter

Zhu Gang, Zhang Jin, Huawei PSIRT

CVE Identifier

CVE-2013-4310

...

In Struts 2 before 2.3.15.23, under certain conditions this can be used to bypass security constraints. More details will available later on when the patch will be widely adopted.

Solution

In Struts 2.3.15.2 3 the action mapping mechanism was changed to avoid circumventing security constraints. Two additional constants were introduced to steer behaviour of DefaultActionMapper:

...

Note
titleBackward Compatibility

After upgrading to Struts 2.3.15.23, applications using the "action:" will stop working. You can use above constants to steer that behaviour.

Warning

It is strongly recommended to upgrade to Struts 2.3.15.23, which contains the corrected Struts2-Core library.