You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Summary

Special top object can be used to access Struts' internals

Who should read this

All Struts 2 developers and users

Impact of vulnerability

Manipulation of Struts' internals, altering of user session

Maximum security rating

High

Recommendation

Update regex used to excluded vulnerable incoming parameters. An upgrade to Struts 2.3.24.1 is recommended.

Affected Software

Struts 2.0.0 - Struts Struts 2.3.24

Reporter

rskvp93 at gmail dot com from Viettel Information Security Center

CVE Identifier

CVE-2015-5209

Problem

ValueStack defines special top object which represents root of execution context. It can be used to manipulate Struts' internals or can be used to affect container's settings

Solution

Applying better regex which includes pattern to exclude request parameters trying to use top object. We recommend upgrading to Struts 2.3.24.1.

Support for expression using top will be dropped in upcoming Struts version 2.5!

Backward compatibility

If an application is using parameter named top to access action's properties, it won't be set on the action. In other case no backward compatibility problems are expected.

Workaround

Applying the below patterns will solve the problem as well:

"(^|\\%\\{)(top(\\.|\\['|\\[\")|#)?(dojo|struts|session|request|application|servlet(Request|Response)|parameters|context|_memberAccess)(\\.|\\[).*",
"^(action|method):.*"
  • No labels