org.apache.struts:struts2-struts1-plugin@2.3.14.3 vulnerabilities

  • latest version

    2.3.37

  • latest non vulnerable version

  • first published

    17 years ago

  • latest version published

    5 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.struts:struts2-struts1-plugin package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Arbitrary Code Execution

    org.apache.struts:struts2-struts1-plugin is a Struts1 plugin for Struts2.

    Affected versions of the package are vulnerable to Arbitrary Code Execution. When using untrusted input as a part of the error message in the ActionMessage class, a malicious user can pass in a raw message to the ActionMessage, which will then run on the server.

    How to fix Arbitrary Code Execution?

    There is no fix version for org.apache.struts:struts2-struts1-plugin.

    The vendor recommends the following:

    Always use resource keys instead of passing a raw message to the ActionMessage as shown below, never pass a raw value directly

    messages.add("msg", new ActionMessage("struts1.gangsterAdded", gform.getName()));
    

    and never like this

    messages.add("msg", new ActionMessage("Gangster " + gform.getName() + " was added"));
    

    [2.3,)