Denial of Service (DoS) Affecting org.apache.struts:struts2-core package, versions [2.0.0, 2.5.22)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
15.6% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHESTRUTS-608098
  • published21 Aug 2020
  • disclosed11 Aug 2020
  • creditTakeshi Terada of Mitsui Bussan Secure Directions, Inc

Introduced: 11 Aug 2020

CVE-2019-0233  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade org.apache.struts:struts2-core to version 2.5.22 or higher.

Overview

org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language.

Affected versions of this package are vulnerable to Denial of Service (DoS). When a file upload is performed to an Action that exposes the file with a getter, an attacker may manipulate the request such that the working copy of the uploaded file is set to read-only. As a result, subsequent actions on the file will fail with an error. It might also be possible to set the Servlet container's temp directory to read-only, such that subsequent upload actions will fail.

References

CVSS Scores

version 3.1