You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Summary

Possible path traversal in the Convention plugin

Who should read this

All Struts 2 developers and users

Impact of vulnerability

Possible path traversal in the Convention plugin in Struts 2.3.20 - 2.3.30

Maximum security rating

High

Recommendation

Upgrade to Struts 2.3.31 or to any version of Struts 2.5

Affected Software

Struts 2.3.20 - Struts 2.3.31

Reporter

Takeshi Terada of Mitsui Bussan Secure Directions, Inc.

CVE Identifier

CVE-2016-6795

Problem

It is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.

Solution

Upgrade to Apache Struts version 2.3.31 when you are using Struts 2.3.20 - 2.3.30 with the Convention plugin.

Backward compatibility

No backward incompatibility issues are expected.

Workaround

There is no known workaround for this vulnerability, please upgrade to the mentioned Struts versions.

 

  • No labels