DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report
  1. DZone
  2. Popular
  3. Open Source
  4. Deja Vu All Over Again? Another New Apache Struts Vulnerability (CVE-2018-11776)

Deja Vu All Over Again? Another New Apache Struts Vulnerability (CVE-2018-11776)

Another remote code execution vulnerability in Apache's Struts2 Framework was disclosed late yesterday leaving many feeling like they're having Deja Vu.

Brian Fox user avatar by
Brian Fox
·
Aug. 24, 18 · News
Like (2)
Save
Tweet
Share
3.34K Views

Join the DZone community and get the full member experience.

Join For Free

Another remote code execution vulnerability in Apache's Struts2 Framework was disclosed late yesterday (August 22nd) - leaving many feeling like they're having Deja Vu. This new vulnerability, which was identified and reported by Man Yue Mo from the Semmle Security Research Team, is quite similar to others we've seen, and which led to high profile and devastating exploits.

CVE-2018-11776 is configuration dependent. It specifically requires that you are not using Namespaces. While there are more nuances to this newest version, most of the configurations are common settings - meaning that if you're using this version of Struts2, you're most likely vulnerable. The public disclosure urgently advises organizations and developers using Struts to upgrade their components immediately to versions 2.3.35 and 2.5.17. As we know, previous public disclosures of similarly critical vulnerabilities have resulted in exploits being published within a day, attacks in the wild within three days, and devastating damage to critical infrastructure and massive theft of customer data over time. As we get so attuned to "another day, another new vuln," the result is that organizations around the world are left scrambling to respond to a brand new threat that they just learned about within the last 24 hours. The good news, however -- at least for those organizations that have embraced automated open source governance and DevOps-style continuous delivery practices -- is that they are uniquely capable of responding.

In this instance, customer's of Sonatype Nexus were notified of CVE-2018-11776 yesterday morning -- just hours after it was publicly disclosed. Additionally, their application security teams were able to rapidly identify which, if any, production applications contained the vulnerable component. Finally, their development teams automatically received step-by-step instructions to remediate the risk.

Separately, DevOps-native organizations with the ability to continuously deploy software releases have an automation advantage that allows them to stay one step ahead of the hackers. According to a recent Forrester survey, 8% of organizations deploy once per day, 25% deploy once per week, and 68% of organizations deploy less than once per month on average.

In this new normal, organizations that actively govern open source hygiene and release software faster face significantly less risk than those that don't.

Vulnerability Apache Struts Open source

Published at DZone with permission of Brian Fox, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Detecting Network Anomalies Using Apache Spark
  • When Should We Move to Microservices?
  • Steel Threads Are a Technique That Will Make You a Better Engineer
  • Integrate AWS Secrets Manager in Spring Boot Application

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: