Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
References
Link | Resource |
---|---|
https://issues.apache.org/jira/browse/WW-3631 | Issue Tracking Vendor Advisory |
http://secunia.com/advisories/47109 | Permissions Required |
http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html | Third Party Advisory |
https://issues.apache.org/jira/browse/WW-2264 | Issue Tracking Vendor Advisory |
Configurations
Information
Published : 2012-01-08 09:55
Updated : 2019-08-12 14:15
NVD link : CVE-2011-5057
Mitre link : CVE-2011-5057
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
apache
- struts