Lucene search

K
seebugRootSSV:96912
HistoryDec 01, 2017 - 12:00 a.m.

Apache Struts2 S2-054(CVE-2017-15707)

2017-12-0100:00:00
Root
www.seebug.org
18

0.002 Low

EPSS

Percentile

61.3%

Summary

A crafted JSON request can be used to perform a DoS attack when using the Struts REST plugin

Who should read this All Struts 2 developers and users which are using the REST plugin
Impact of vulnerability A DoS attack is possible when using outdated json-lib with the Struts REST plugin
Maximum security rating Medium
Recommendation Upgrade to Struts 2.5.14.1
Affected Software Struts 2.5 - Struts 2.5.14
Reporter Huijun Chen, XiaoLong Zhu - Huawei Technologies
CVE Identifier CVE-2017-15707

Problem

The REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.

Solution

Upgrade to Apache Struts version 2.5.14.1. Another solution is to use the Jackson handler instead of the default JSON-lib handler as described here.

Backward compatibility

No backward incompatibility issues are expected.

Workaround

Use Jackson handler instead of the default JSON-lib handler as described here.