You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

Security impact levels (WIP)

The Apache Struts Security Team rates the impact of each security flaw that affects Struts. We've chosen a rating scale quite similar to those used by other major vendors in order to be consistent. Basically the goal of the rating system is to answer the question "How worried should I be about this vulnerability?".

Critical

A vulnerability rated with a Critical impact is one which could potentially be exploited by a remote attacker to get Struts to execute arbitrary code. These are the sorts of vulnerabilities that could be exploited automatically by worms.

Important

A vulnerability rated as Important impact is one which could result in the compromise of data or availability of the application. For Struts this includes issues that allow an easy remote denial of service (something that is out of proportion to the attack or with a lasting consequence), access to arbitrary files outside of the context root, or access to files that should be otherwise prevented by limits or authentication.

Moderate

A vulnerability is likely to be rated as Moderate if there is significant mitigation to make the issue less of an impact. This might be because the flaw does not affect likely configurations, or it is a configuration that isn't widely used, or where a remote user must be authenticated in order to exploit the issue. Flaws that allow Tomcat to serve directory listings instead of index files and cross-site scripting issues are included here.

Low

All other security flaws are classed as a Low impact. This rating is used for issues that are believed to be extremely hard to exploit, or where an exploit gives minimal consequences.

Published bulletins

The following security bulletins are available:

  • No labels