Release date:
Updated on: 2012-09-04
Affected Systems:
Apache Group Struts 2.x
Description:
--------------------------------------------------------------------------------
Apache Struts is an open-source web application framework for developing Java Web applications.
Apache Struts earlier than version 2.3.4.1 has a security vulnerability that can be exploited by malicious users to perform cross-site Request Forgery and denial of service attacks.
1) the token processing mechanism does not correctly verify the token name configuration parameters. The operation token value parameter is the session property value. This vulnerability can be exploited to perform cross-site request forgery attacks.
2) errors in processing request parameters can be exploited to consume CPU resources. Dos can be caused by parameter names containing OGNL expressions.
<* Source: James K. Williams
Link: http://secunia.com/advisories/50420/
Http://struts.apache.org/2.x/docs/s2-010.html
Http://struts.apache.org/2.x/docs/s2-011.html
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Apache Group
------------
Apache Group has released a Security Bulletin (s2-010) and patches for this:
S2-010: Apache Struts 2 Documentation
Link: http://struts.apache.org/2.x/docs/s2-010.html