Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
References
Link | Resource |
---|---|
http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html | Third Party Advisory |
http://secunia.com/advisories/47109 | Permissions Required |
https://issues.apache.org/jira/browse/WW-2264 | Issue Tracking Vendor Advisory |
https://issues.apache.org/jira/browse/WW-3631 | Issue Tracking Vendor Advisory |
http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html | Third Party Advisory |
http://secunia.com/advisories/47109 | Permissions Required |
https://issues.apache.org/jira/browse/WW-2264 | Issue Tracking Vendor Advisory |
https://issues.apache.org/jira/browse/WW-3631 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html - Third Party Advisory | |
References | () http://secunia.com/advisories/47109 - Permissions Required | |
References | () https://issues.apache.org/jira/browse/WW-2264 - Issue Tracking, Vendor Advisory | |
References | () https://issues.apache.org/jira/browse/WW-3631 - Issue Tracking, Vendor Advisory |
Information
Published : 2012-01-08 17:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5057
Mitre link : CVE-2011-5057
CVE.ORG link : CVE-2011-5057
JSON object : View
Products Affected
apache
- struts
CWE
CWE-264
Permissions, Privileges, and Access Controls