We (Apache Struts) do not share the exact PoCs anymore to reduce risk of informing attackers how to use given vulnerability, you can find some examples over the internet - that's all I can suggest.
2014-05-16 23:57 GMT+02:00 Deepak Subbanarasimha <d.subbanarasi...@kewill.com>: > Lukasz, > > Thank you for responding. This is very helpful. > > Do you have information on what kind of attacks this vulnerability would > expose systems to? Ex. Cross-Site scripting. Is there anything else? > > Do you have any suggestions on how to test this fix? > > Thanks, > Deepak > > -----Original Message----- > From: Lukasz Lenart [mailto:lukaszlen...@apache.org] > Sent: Monday, May 05, 2014 8:00 AM > To: Struts Users Mailing List > Subject: Re: Struts zero-day vulnerability > > Here you have more details [1] and just to point it out - Struts 1 reached > EOL [2] and no further development is expected! Consider migration to Struts2 > or any other modern framework. > > [1] > http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.U2d8va2wlzt > [2] http://struts.apache.org/struts1eol-announcement.html > > 2014-05-05 13:53 GMT+02:00 Deepak Subbanarasimha > <d.subbanarasi...@kewill.com>: >> Hello, >> >> We use struts version 1.2.2 and commons-file upload version 1.1.1. It is >> not clear from this notification if these versions are impacted. >> >> >> 1. Can anyone confirm if these versions or affected? >> >> 2. If they are affected, what can be done? Should we upgrade to Struts >> 2.x? >> >> The notification below only talks about struts 2.x version. >> >> -Deepak >> >> >> >> PURPOSE >> >> ------------- >> >> The purpose of this Alert is to bring attention to a recently announced >> security vulnerability for Apache Struts. >> >> >> >> ASSESSMENT >> >> ------------------ >> >> Apache Struts up to 2.3.16.1 is being reported as having a zero-day >> vulnerability. In particular, Struts 2.3.16.1 has an issue with ClassLoader >> manipulation via request parameters which was supposed to be resolved on 2 >> March 2014 through a security fix. Unfortunately, it was confirmed that the >> correction wasn't sufficient. >> >> >> >> According to the Apache Struts Team, a security fix release fully addressing >> all these issues is in preparation and will be released as soon as possible. >> Once the release is available, all Struts 2 users are strongly encouraged to >> update their installations. >> >> >> >> SUGGESTED ACTION >> >> ---------------------------- >> >> The Apache Struts Team has published the following mitigation information: >> >> >> >> In the struts.xml, replace all custom references to params-interceptor with >> the following code, especially regarding the class-pattern found at the >> beginning of the excludeParams list: >> >> >> >> <interceptor-ref name="params"> >> >> <param >> >> name="excludeParams">(.*\.|^|.*|\[('|"))(c|C)lass(\.|('|")]|\[).*,^doj >> o\..*,^struts\..*,^session\..*,^request\..*,^application\..*,^servlet( >> Request|Response)\..*,^parameters\..*,^action:.*,^method:.*</param> >> >> </interceptor-ref> >> >> >> >> If you are using default interceptor stacks packaged in >> struts-default.xml, change your parent packages to a customized >> secured configuration as in the following example. Given you are using >> defaultStack so far, change your packages from >> >> >> >> <package name="default" namespace="/" extends="struts-default"> >> >> <default-interceptor-ref name="defaultStack" /> >> >> ... >> >> ... >> >> </package> >> >> to >> >> >> >> <package name="default" namespace="/" extends="struts-default"> >> >> <interceptors> >> >> <interceptor-stack name="secureDefaultStack"> >> >> <interceptor-ref name="defaultStack"> >> >> <param >> >> name="params.excludeParams">(.*\.|^|.*|\[('|"))(c|C)lass(\.|('|")]|\[) >> .*,^dojo\..*,^struts\..*,^session\..*,^request\..*,^application\..*,^s >> ervlet(Request|Response)\..*,^parameters\..*,^action:.*,^method:.*</pa >> ram> >> >> </interceptor-ref> >> >> </interceptor-stack> >> >> </interceptors> >> >> >> >> <default-interceptor-ref name="secureDefaultStack" /> >> >> ... >> >> </package> >> >> >> >> References: >> >> ================= >> >> http://struts.apache.org/announce.html#a20140302 >> >> IMPORTANT NOTICE: This email is intended solely for the use of the >> individual to whom it is addressed and may contain information that is >> privileged, confidential or otherwise exempt from disclosure under >> applicable law. If the reader of this email is not the intended recipient or >> the employee or agent responsible for delivering the message to the intended >> recipient, you are hereby notified that any dissemination, distribution, or >> copying of this communication is strictly prohibited. If you have received >> this communication in error, please immediately return the original message >> to the sender at the listed email address. In accordance with Kewill policy, >> emails sent and received may be monitored. Although Kewill takes reasonable >> precautions to minimize the risk, Kewill accepts no responsibility for any >> loss or damage should this email contain any virus, or similar destructive >> or mischievous code. > > --------------------------------------------------------------------- > To unsubscribe, e-mail: user-unsubscr...@struts.apache.org > For additional commands, e-mail: user-h...@struts.apache.org > --------------------------------------------------------------------- To unsubscribe, e-mail: user-unsubscr...@struts.apache.org For additional commands, e-mail: user-h...@struts.apache.org