搜索
查看: 4307|回复: 0

Struts 2新漏洞(可能出现远程代码执行)

[复制链接]

1839

主题

2255

帖子

1万

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
11913
发表于 2016-3-15 22:14:57 | 显示全部楼层 |阅读模式
Summary

Double OGNL evaluation when using raw user input in tag's attributes.
Who should read this

All Struts 2 developers and users

Impact of vulnerability

Possible Remote Code Execution vulnerability

Maximum security rating

Important

Recommendation

Always validate incoming parameters' values when re-assigning them to certain Struts' tags attributes. Alternatively upgrade to Struts 2.3.25

Affected Software

Struts 2.0.0 - Struts Struts 2.3.24.1

Reporter

Romain Gaucher rgaucher at coverity dot com - Coverity

CVE Identifier

CVE-2016-0785

Problem

The Apache Struts frameworks performs double evaluation of attributes' values assigned to certain tags so it is possible to pass in a value that will be evaluated again when a tag's attributes will be rendered.

Solution

Adding a proper validation of each value that's coming in and it's used in tag's attributes. Alternatively upgrade to Struts 2.3.25.

Backward compatibility

No issues expected when upgrading to Struts 2.3.25

Workaround

Not possible

Generated by CXF SiteExporter


官方公告:http://struts.apache.org/docs/s2-029.html
过段时间可能会取消签到功能了
您需要登录后才可以回帖 登录 | Join BUC

本版积分规则

Powered by Discuz!

© 2012-2015 Baiker Union of China.

快速回复 返回顶部 返回列表