IMCAFS

Home

048: st2

Posted by lipsius at 2020-03-22
all

Apache Struts 2 possible RCE in the Struts Showcase app in the Struts 1 plugin example in the Struts 2.3.x series http://struts.apache.org/docs/s2-048.html https://cwiki.apache.org/confluence/display/WW/S2-048 Summary Possible RCE in the Struts Showcase app in the Struts 1 plugin example in Struts 2.3.x series Who should read this         All Struts 2 developers and users should read this Who should read this         All Struts 2 developers and users should read this Impact of vulnerability        Possible RCE when using the Struts 2 Struts 1 plugin Impact of vulnerability        Possible RCE when using the Struts 2 Struts 1 plugin Maximum security rating High Maximum security rating High Recommendation Please read the Solution section Recommendation Please read the Solution section Affected Software Struts 2.3.x with Struts 1 plugin and Struts 1 action Affected Software Struts 2.3.x with Struts 1 plugin and Struts 1 action Reporter icez from Tophant Competence Center Reporter icez from Tophant Competence Center CVE Identifier CVE-2017-9791 CVE Identifier CVE-2017-9791 Problem It is possible to perform a RCE attack with a malicious field value when using the Struts 2 Struts 1 plugin and it's a Struts 1 action and the value is a part of a message presented to the user, i.e. when using untrusted input as a part of the error message in the ActionMessage class. Solution Always use resource keys instead of passing a raw message to the ActionMessage as shown below, never pass a raw value directly messages.add("msg", new ActionMessage("struts1.gangsterAdded", gform.getName())); and never like this messages.add("msg", new ActionMessage("Gangster " + gform.getName() + " was added")); Backward compatibility No backward incompatibility issues are expected. 【漏洞分析】Struts2高危漏洞S2-048分析 http://m.bobao.360.cn/learning/detail/4078.html