Apache Struts Bugs Let Remote Users Deny Service and Manipulate the ClassLoader
SecurityTracker Alert ID: 1029876|
SecurityTracker URL: http://securitytracker.com/id/1029876
(Links to External Site)
Updated: Apr 25 2014|
Original Entry Date: Mar 6 2014
Denial of service via network, Disclosure of system information, Modification of system information|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 2.0.0 - 2.3.16|
Two vulnerabilities were reported in Apache Struts. A remote user can cause denial of service conditions. A remote user can manipulate the ClassLoader.|
A remote user can supply specially crafted 'class' parameter values to the ParametersInterceptor class to manipulate the ClassLoader [CVE-2014-0094].
A remote user can send a multipart request with a specially crafted Content-Type header to to trigger a flaw in the Apache Commons FileUpload component and cause denial of service conditions [CVE-2014-0050].
Mark Thomas and Przemyslaw Celej reported these vulnerabilities.
A remote user can cause denial of service conditions.|
A remote user can manipulate the ClassLoader.
The vendor has issued a fix (22.214.171.124).|
[Editor's note: The original fix for CVE-2014-0094 is incomplete (see Alert ID 1030152).]
The vendor's advisory is available at:
Vendor URL: struts.apache.org/release/2.3.x/docs/s2-020.html (Links to External Site)
Access control error, Input validation error, State error|
Linux (Any), UNIX (Any), Windows (Any)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Date: Thu, 06 Mar 2014 10:04:12 +0100|
Subject: [ANN] Struts 126.96.36.199 GA release available - security fix
The Apache Struts group is pleased to announce that Struts 188.8.131.52 is
available as a "General Availability" release.The GA designation is
our highest quality grade.
Apache Struts 2 is an elegant, extensible framework for creating
enterprise-ready Java web applications. The framework is designed to
streamline the full development cycle, from building, to deploying, to
maintaining applications over time.
This release includes important security fixes:
- S2-020 - ClassLoader manipulation via request parameters
- upgraded Commons FileUpload library to prevent DoS attacks
All developers are strongly advised to update existing Struts 2
applications to Struts 184.108.40.206
Struts 220.127.116.11 is available in a full distribution, or as separate
library, source, example and documentation distributions, from the
The release is also available from the central Maven repository under
Group ID "org.apache.struts".
The 2.3.x series of the Apache Struts framework has a minimum
requirement of the following specification versions:
* Java Servlet 2.4 and JavaServer Pages (JSP) 2.0
* Java 2 Standard Platform Edition (J2SE) 5
The release notes are available online at:
Should any issues arise with your use of any version of the Struts
framework, please post your comments to the user list, and, if
appropriate, file a tracking ticket.appropriate, file a tracking
- The Apache Struts group.
+ 48 606 323 122 http://www.lenart.org.pl/