org.apache.struts:struts2-struts1-plugin@2.3.30 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.struts:struts2-struts1-plugin package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Arbitrary Code Execution

org.apache.struts:struts2-struts1-plugin is a Struts1 plugin for Struts2.

Affected versions of the package are vulnerable to Arbitrary Code Execution. When using untrusted input as a part of the error message in the ActionMessage class, a malicious user can pass in a raw message to the ActionMessage, which will then run on the server.

How to fix Arbitrary Code Execution?

There is no fix version for org.apache.struts:struts2-struts1-plugin.

The vendor recommends the following:

Always use resource keys instead of passing a raw message to the ActionMessage as shown below, never pass a raw value directly

messages.add("msg", new ActionMessage("struts1.gangsterAdded", gform.getName()));

and never like this

messages.add("msg", new ActionMessage("Gangster " + gform.getName() + " was added"));

[2.3,)