Apache Struts arbitrary tresult Arbitrary Code Execution Vulnerability (CVE-2016-3082)
Apache Struts arbitrary tresult Arbitrary Code Execution Vulnerability (CVE-2016-3082)
Release date:
Updated on:
Affected Systems:
Apache Group Struts 2.x < 2.3.20.2
Apache Group Struts 2.3.28.x < 2.3.28.1
Apache Group Struts 2.3.24.x < 2.3.24.2
Unaffected system:
Apache Group Struts 2.3.28.1
Apache Group Struts 2.3.24.2
Apache Group Struts 2.3.20.2
Description:
CVE (CAN) ID: CVE-2016-3082
Struts2 is an extensible framework for building enterprise-level Jave Web applications.
Apache Struts 2.x <2.3.20.2, 2.3.24.x <2.3.24.2, 2.3.28.x <2.3.28.1, and javastresult allow the style sheet location to be used as a request parameter, which allows attackers to remotely inject executable code.
<* Source: GENXOR
*>
Suggestion:
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://struts.apache.org/docs/s2-031.html
Https://struts.apache.org/docs/version-notes-2328.html
Recommended reading:
Send XML and JSON data asynchronously in Struts
Getting started instance of Struts2
Struts2 Study Notes-Value Stack and OGNL expressions
Upload struts2 files (Save As BLOB)
Getting started instance of Struts2
Implement the ModelDriven interface in Struts2
Struts2 file downloading garbled
Struts2 Spring integration methods and principles
Several knowledge points about Struts2 annotation Mode
Struts details: click here
Struts: click here
This article permanently updates the link address: