You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Summary

When using Struts 2 token mechanism for CSRF protection, token configuration might be tweaked to allow access by misusing known session attributes

Who should read this

All Struts 2 developers

Impact of vulnerability

CSRF protection weakening

Maximum security rating

Moderate

Recommendation

Developers should either upgrade to Struts 2.3.4.1

Affected Software

Struts 2.0.0 - Struts 2.3.4

Original JIRA Tickets

WW-3858

Reporter

-

CVE Identifier

-

Problem

User input is evaluated as an OGNL expression when there's a conversion error. This allows a malicious user to execute arbitrary code. 
A more detailed description is found in the referenced JIRA ticket.

Solution

Upgrade to Struts 2.2.3.1.

  • No labels