Apache Struts method: prefix Arbitrary Code Execution Vulnerability (CVE-2016-3081)
Apache Struts method: prefix Arbitrary Code Execution Vulnerability (CVE-2016-3081)
 
Release date:
Updated on:
Affected Systems:
 
Apache Group Struts 2.x < 2.3.20.2
Apache Group Struts 2.3.28.x < 2.3.28.1
Apache Group Struts 2.3.24.x < 2.3.24.2
 
Unaffected system:
 
Apache Group Struts 2.3.28.1
Apache Group Struts 2.3.24.2
Apache Group Struts 2.3.20.2
 
Description:
  
CVE (CAN) ID: CVE-2016-3081
Struts2 is an extensible framework for building enterprise-level Jave Web applications.
Apache Struts 2.x <2.3.20.2, 2.3.24.x <2.3.24.2, and 2.3.28.x <2.3.28.1. After Dynamic Method Invocation is enabled, attackers can remotely inject executable code using method: prefix.
<* Source: Nike Zheng
*>
Suggestion:
  
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://struts.apache.org/docs/version-notes-2328.html
Https://struts.apache.org/docs/s2-032.html
 
Recommended reading:
 
Send XML and JSON data asynchronously in Struts
 
Getting started instance of Struts2
 
Struts2 Study Notes-Value Stack and OGNL expressions
 
Upload struts2 files (Save As BLOB)
 
Getting started instance of Struts2
 
Implement the ModelDriven interface in Struts2
 
Struts2 file downloading garbled
 
Struts2 Spring integration methods and principles
 
Several knowledge points about Struts2 annotation Mode
 
Struts details: click here
Struts: click here
 
This article permanently updates the link address: