Apache Struts REST plug-in Arbitrary Code Execution Vulnerability (CVE-2016-4438)

Source: Internet
Author: User
Tags cve

Apache Struts REST plug-in Arbitrary Code Execution Vulnerability (CVE-2016-4438)
Apache Struts REST plug-in Arbitrary Code Execution Vulnerability (CVE-2016-4438)

Release date:
Updated on:

Affected Systems:

Apache Group Struts2 2.3.20-


CVE (CAN) ID: CVE-2016-4438

Struts2 is an extensible framework for building enterprise-level Jave Web applications.

Apache Struts 2 2.3.20- has a security vulnerability in the REST plug-in. Remote attackers can execute arbitrary code by constructing expressions.

<* Source: Shinsaku Nomura nomura
Chao Jack PKAV _ vanilla jc1990999

Link: https://struts.apache.org/docs/s2-037.html


Vendor patch:

Apache Group
Apache Group has released a Security Bulletin (S2-037) and patches for this:
S2-037: Remote Code Execution can be installed med when using REST Plugin.
Link: https://struts.apache.org/docs/s2-037.html

Patch download: https://struts.apache.org/docs/version-notes-2329.html

This article permanently updates the link address:

Related Article

E-Commerce Solutions

Leverage the same tools powering the Alibaba Ecosystem

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.