Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Excerpt

Generated value of token can be predictable


Who should read this

All Struts 2 developers and users

Impact of vulnerability

The attacker make a specially craft form using the predicted token that force an action to a logged-in user (CSRF).

Maximum security rating

Medium

Moderate

Recommendation

Developers should immediately upgrade to Struts 2.3.20 if they use <s:token/> support

Affected Software

Struts 2.0.0 - Struts 2.3.16.3

Reporter

Philippe Arteau

/ @h3xStream

of Groupe Technologies Desjardins

CVE Identifier

TDB

CVE-2014-7809

Problem

The attacker fetch any given form where a token is present and can predict the next value of the token used to secure form submission.

...

No backward compatibility problems are expected.

Workaround

Not possible when using <s:token/> tag - you must upgrade to the latest version.