Apache Struts method: prefix Arbitrary Code Execution Vulnerability (CVE-2016-3081)
Apache Struts method: prefix Arbitrary Code Execution Vulnerability (CVE-2016-3081)
Release date:
Updated on:
Affected Systems:
Apache Group Struts 2.x < 2.3.20.2
Apache Group Struts 2.3.28.x < 2.3.28.1
Apache Group Struts 2.3.24.x < 2.3.24.2
Unaffected system:
Apache Group Struts 2.3.28.1
Apache Group Struts 2.3.24.2
Apache Group Struts 2.3.20.2
Description:
CVE (CAN) ID: CVE-2016-3081
Struts2 is an extensible framework for building enterprise-level Jave Web applications.
Apache Struts 2.x <2.3.20.2, 2.3.24.x <2.3.24.2, and 2.3.28.x <2.3.28.1. After Dynamic Method Invocation is enabled, attackers can remotely inject executable code using method: prefix.
<* Source: Nike Zheng
*>
Suggestion:
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://struts.apache.org/docs/version-notes-2328.html
Https://struts.apache.org/docs/s2-032.html
Recommended reading:
Send XML and JSON data asynchronously in Struts
Getting started instance of Struts2
Struts2 Study Notes-Value Stack and OGNL expressions
Upload struts2 files (Save As BLOB)
Getting started instance of Struts2
Implement the ModelDriven interface in Struts2
Struts2 file downloading garbled
Struts2 Spring integration methods and principles
Several knowledge points about Struts2 annotation Mode
Struts details: click here
Struts: click here
This article permanently updates the link address: