HTTP: Apache Struts Improper classLoader Parameter Handling Security Bypass
This signature detects attempts to exploit a known vulnerability against Apache Struts. A successful attack can allow an attacker to bypass the Java security policies and load malicious class files. Successful exploitation of this vulnerability can lead to arbitrary code execution.
Extended Description
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
Affected Products
Apache commons_beanutils
References
CVE: CVE-2014-0113
URL: http://struts.apache.org/release/2.3.x/docs/s2-020.html http://www.pwntester.com/blog/2014/04/24/struts2-0day-in-the-wild/ http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Update-your-Struts-1-ClassLoader-manipulation-filters/ba-p/6639204 https://github.com/rgielen/struts1filter/tree/develop http://struts.apache.org/release/2.3.x/docs/s2-021.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Apache
7.5
5.0