Apache Struts 2 Security Bypass Vulnerabilities
May 12, 2014
Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model-view-controller (MVC) architecture.Several security bypass vulnerabilities exist in Apache Struts. Specifically, the vulnerabilities are due to design errors that allow any user to manipulate a ClassLoader. A remote attacker could exploit these vulnerabilities by sending a crafted HTTP request to the target server. Successful exploitation would allow the attacker to access and manipulate Java ClassLoader objects associated with the Apache Struts application. Dell SonicWALL has researched the vulnerabilities and released the following signature(s) to detect and block specific exploitation attempts targeting these vulnerabilities:
- IPS 3720 "Apache Struts ClassLoader Manipulation 1"
- IPS 3778 "Apache Struts ClassLoader Manipulation 2"