Apache Struts 2 Security Bypass Vulnerabilities

May 12, 2014

Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model-view-controller (MVC) architecture.

Several security bypass vulnerabilities exist in Apache Struts. Specifically, the vulnerabilities are due to design errors that allow any user to manipulate a ClassLoader. A remote attacker could exploit these vulnerabilities by sending a crafted HTTP request to the target server. Successful exploitation would allow the attacker to access and manipulate Java ClassLoader objects associated with the Apache Struts application.

Dell SonicWALL has researched the vulnerabilities and released the following signature(s) to detect and block specific exploitation attempts targeting these vulnerabilities:

  • IPS 3720 “Apache Struts ClassLoader Manipulation 1”
  • IPS 3778 “Apache Struts ClassLoader Manipulation 2”

CVE-2014-0094, CVE-2014-0112, CVE-2014-0113 and CVE-2014-0114 are related to the vulnerabilities mentioned above.