DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Remote Code Execution Vulnerability in Apache Struts 2 CVE 2018-11776

Remote Code Execution Vulnerability in Apache Struts 2 CVE 2018-11776

The Apache Foundation has confirmed the findings of an independent security research group that a critical remote code execution flaw exists in the popular Struts 2 open source framework.

James Lee user avatar by
James Lee
·
Aug. 23, 18 · News
Like (1)
Save
Tweet
Share
9.42K Views

Join the DZone community and get the full member experience.

Join For Free

Overview

The Apache Foundation has confirmed the findings of an independent security research group that a critical remote code execution flaw exists in the popular Struts 2 open source framework. Designated CVE 2018-11776, this vulnerability is located in the core of Apache Struts 2 and impacts all supported versions of Struts 2.

Waratek Enterprise customers are protected against RCE attacks as a core feature.

Waratek Patch customers will receive a virtual patch to specifically address CVE 2018-11776.

Non-Waratek customers should upgrade to Apache Struts version 2.3.35 or 2.5.17 as soon as possible. However, users who have highly customized code may find it difficult to upgrade and may be vulnerable to breaking the functionality of their applications

Details

Struts 2 is one of the most widely used web application frameworks with a history of vulnerabilities to remote code execution attacks. Malicious attackers have been able to use automated scanners to identify and exploit previous flaws within hours of an announced CVE, including CVE 2017-5638, also known as the Equifax flaw.

The new vulnerability was discovered by Security Researcher Man Yue Mo of Semmle.

"This vulnerability affects commonly-used endpoints of Struts, which are likely to be exposed, opening up an attack vector to malicious hackers. On top of that, the weakness is related to the Struts OGNL language, which hackers are very familiar with, and are known to have been exploited in the past. On the whole, this is more critical than the highly critical Struts RCE vulnerability that the Semmle Security Research Team discovered and announced last September."

CVE 2018-11776 is linked to insufficient validation of untrusted user data in the core of the Struts framework, resulting in multiple attack vectors.

An application is believed to be vulnerable if the following conditions exist:

  1. The alwaysSelectFullNamespace flag is set to true in the Struts configuration. This is default setting if an application uses the popular Struts Convention plugin.
  2. An application's Struts configuration file contains an <action ...> tag that does not specify the optional namespace attribute, or specifies a wildcard namespace (e.g. "/*")

Application configurations that do not meet these two conditions, are likely not vulnerable to the current attack vectors. However, Apache and Semmle acknowledge that new attack vectors may be discovered.

Apache Struts, Struts, Apache, the Apache feather logo, and the Apache Struts project logos are trademarks of The Apache Software Foundation.
Apache Struts Apache Struts 2 Vulnerability remote Execution (computing) Web application

Published at DZone with permission of James Lee, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • How To Handle Secrets in Docker
  • Fargate vs. Lambda: The Battle of the Future
  • Spring Boot vs Eclipse MicroProfile: Resident Set Size (RSS) and Time to First Request (TFR) Comparative
  • Reliability Is Slowing You Down

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: