Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Who should read this

All Struts 2 developers and users

Impact of vulnerability

Possible Remote Code Execution vulnerability

Maximum security rating

Important

Recommendation

Always validate incoming parameters' values when re-assigning them to certain Struts' tags attributes.

Don't use %{...} syntax in tag attributes unless you have a valid use-case.

Alternatively upgrade to Struts 2.3.27

Affected Software

Struts 2.0.0 - Struts Struts 2.3.24.1

Reporter

Romain Gaucher rgaucher at coverity dot com - Coverity
Lupin lupin1314 at gmail dot com 

CVE Identifier

CVE-2016-0785

...

Adding a proper validation of each value that's coming in and it's used in tag's attributes. Or don

Don't use forced evaluation of an attribute using %{...} syntax . Alternatively unless really needed for a valid use-case. 

By upgrading upgrade to Struts 2.3.27, possible malicious effects of forced double evaluation are limited.

Backward compatibility

No issues expected when upgrading to Struts 2.3.27

...