|
|||
Rule General Information |
---|
Release Date: | 2014-03-11 | |
Rule Name: | Apache Struts OGNL Command Execution Vulnerability | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Apache Struts is a Model-View-Controller (MVC) framework for building Java-based web applications. Struts allows the use of OGNL expressions in its tag library to denote parameter values. OGNL expressions allow direct member access, a malicious request parameter can be used to set the allowStaticMethodAccess field to be true. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Solaris, Other Unix, FreeBSD, Linux | |
Reference: | SecurityFocusBID:60167 http://struts.apache.org/development/2.x/docs/s2-014.html https://bugzilla.redhat.com/show_bug.cgi?id=967656 https://cwiki.apache.org/confluence/display/WW/S2-014 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: http://struts.apache.org/development/2.x/docs/s2-014.html |