Apache Struts 2 remote code execution vulnerability in CVE-2016-0785)
Apache Struts 2 remote code execution vulnerability in CVE-2016-0785)
Release date:
Updated on:
Affected Systems:
Apache Group Struts2 2.0.0 - 2.3.14.1
Description:
CVE (CAN) ID: CVE-2016-0785
Struts2 is an extensible framework for building enterprise-level Jave Web applications.
Struts 2.0.0-2.3.24.1 evaluates the attribute values of a specific tag in double OGNL mode, attackers can execute arbitrary code on the target system by providing the constructed attribute tag data to the affected application.
<* Source: Romain Gaucher rgaucher
Link: http://struts.apache.org/docs/s2-029.html
*>
Suggestion:
Vendor patch:
Apache Group
------------
Apache Group has released a Security Bulletin (s2-029) and patches for this:
S2-029: S2-029
Link: http://struts.apache.org/docs/s2-029.html
Patch download: http://struts.apache.org/docs/version-notes-2326.html
Struts2 Study Notes-Value Stack and OGNL expressions
Upload struts2 files (Save As BLOB)
Getting started instance of Struts2
Implement the ModelDriven interface in Struts2
Struts2 file downloading garbled
Struts2 Spring integration methods and principles
Several knowledge points about Struts2 annotation Mode
Struts details: click here
Struts: click here
This article permanently updates the link address: