org.apache.struts:struts2-rest-plugin@2.3.24.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.struts:struts2-rest-plugin package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

org.apache.struts:struts2-rest-plugin provides high level support for the implementation of RESTful resource based web applications Convention Plugin.

Affected versions of this package are vulnerable to Denial of Service (DoS) attacks. An attacker may post a specially crafted XML request in order to perform a DoS attack when using the Struts REST plugin.

How to fix Denial of Service (DoS)?

Upgrade org.apache.struts:struts2-rest-plugin to version 2.5.16 or higher.

[2.1.1,2.5.16)
  • C
Improper Action Name Cleanup

org.apache.struts:struts2-rest-plugin is a free open-source solution for creating Java web applications.

Affected versions of this package are vulnerable to Improper Action Name Cleanup. It allowed attackers to have unspecified impact via vectors related to improper action name clean up.

How to fix Improper Action Name Cleanup?

Upgrade org.apache.struts:struts2-rest-plugin to version 2.3.29, 2.5.1 or higher.

[2.0.0,2.3.29) [2.5,2.5.1)
  • C
Arbitrary Code Execution

org.apache.struts:struts2-rest-plugin is a free open-source solution for creating Java web applications.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows remote attackers to execute arbitrary code via a crafted expression.

How to fix Arbitrary Code Execution?

Upgrade org.apache.struts:struts2-rest-plugin to version 2.3.29 or higher.

[2.3.20,2.3.29)