CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Apache Struts Multiple Remote Code Execution Vulnerabilities (S2-016,S2-017)

2016年10月4日 1584点热度 0人点赞 0条评论

漏洞类别:Web Application

漏洞等级:

漏洞信息

The Apache Struts web framework is a free open source solution for creating Java web applications.

Apache Struts is prone to multiple remote code execution vulnerabilities CVE-2013-2251 and CVE-2013-2248, because it fails to adequately handle user-supplied input.

Apache Structs is affected by the following issues:
The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with "action:" or "redirect:", followed by a desired navigational target expression. This mechanism was intended to help with attaching navigational information to buttons within forms.
The unsanitized OGNL expressions are root cause of these vulnerabilities. In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized.

漏洞危害

This vulnerability could allow for open redirects or execution of arbitrary commands on the server, potentially resulting in complete system compromise.

解决方案

Upgrade to the latest version of the Apache Struts 2 framework to fix these issues. For more details please refer to the S2-016 and S2-017.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

Struts 2.3.15.1

Virtual Patches:
Trend Micro Virtual Patching
Virtual Patch #1005604: 1005604 - Apache Struts Multiple Remote Command Execution Vulnerability

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me