SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Apache Struts Vendors:   Apache Software Foundation
Apache Struts Bugs Let Remote Users Manipulate the ClassLoader to Execute Arbitrary Code
SecurityTracker Alert ID:  1030152
SecurityTracker URL:  http://securitytracker.com/id/1030152
CVE Reference:   CVE-2014-0112, CVE-2014-0113   (Links to External Site)
Updated:  Apr 28 2014
Original Entry Date:  Apr 24 2014
Impact:   Execution of arbitrary code via network, Modification of system information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.3.16.1 and prior
Description:   Two vulnerabilities were reported in Apache Struts. A remote user can execute arbitrary code on the target system.

A remote user can supply specially crafted 'class' parameter values to the ParametersInterceptor class to manipulate the ClassLoader and execute arbitrary code [CVE-2014-0112].

[Editor's note: This vulnerability is due to an incomplete fix for the previously reported ClassLoader vulnerability that was assigned CVE-2014-0094 (Struts Advisory S2-020; Alert ID 1029876).]

A remote user can supply specially crafted parameter values to the CookieInterceptor class to manipulate the ClassLoader and execute arbitrary code [CVE-2014-0113]. Systems configured to accept all cookies are affected.

Taki Uchiyama (JPCERT/CC), Takeshi Terada (Mitsui Bussan Secure Directions, Inc.), Takayoshi Isayama (Mitsui Bussan Secure Directions, Inc.), Yoshiyuki Karezaki (Yoshiyuki.Karezaki at scsk.jp), BAKA/ty (121605589 at qq.com), Shine (1983059165 at qq.com), NSFOCUS Security Team, and heige (zhoujp at knownsec.com) reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (2.3.16.2).

The vendor's advisory is available at:

http://struts.apache.org/release/2.3.x/docs/s2-021.html

Vendor URL:  struts.apache.org/release/2.3.x/docs/s2-021.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 25 2014 (VMware Issues Fix for vCenter Operations Management Suite) Apache Struts Bugs Let Remote Users Manipulate the ClassLoader to Execute Arbitrary Code
VMware has issued a fix for vCenter Operations Management Suite 5.8.x.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC