Lucene search

K
zdtHuijun Chen1337DAY-ID-29101
HistoryDec 02, 2017 - 12:00 a.m.

Apache Struts2 S2-054 DoS Vulnerability

2017-12-0200:00:00
Huijun Chen
0day.today
17

0.002 Low

EPSS

Percentile

61.3%

Exploit for multiple platform in category dos / poc

Summary

A crafted JSON request can be used to perform a DoS attack when using the Struts REST plugin
	
Who should read this 	All Struts 2 developers and users which are using the REST plugin
Impact of vulnerability 	A DoS attack is possible when using outdated json-lib with the Struts REST plugin
Maximum security rating 	Medium
Recommendation 	Upgrade to Struts 2.5.14.1
Affected Software 	Struts 2.5 - Struts 2.5.14
Reporter 	Huijun Chen, XiaoLong Zhu - Huawei Technologies
CVE Identifier 	CVE-2017-15707
Problem

The REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
Solution

Upgrade to Apache Struts version 2.5.14.1. Another solution is to use the Jackson handler instead of the default JSON-lib handler as described here.
Backward compatibility

No backward incompatibility issues are expected.
Workaround

Use Jackson handler instead of the default JSON-lib handler as described here.

Source
https://cwiki.apache.org/confluence/display/WW/s2-054

#  0day.today [2018-04-09]  #