HTTP: Apache Struts Improper classLoader Parameter Handling Security Bypass

This signature detects attempts to exploit a known vulnerability against Apache Struts. A successful attack can allow an attacker to bypass the Java security policies and load malicious class files. Successful exploitation of this vulnerability can lead to arbitrary code execution.

Extended Description

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Affected Products

Apache commons_beanutils

Short Name
HTTP:APACHE:STRUTS-SECBYPASS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apache Bypass CVE-2014-0094 CVE-2014-0112 CVE-2014-0113 CVE-2014-0114 Handling Improper Parameter Security Struts bid:65999 bid:67121 classLoader
Release Date
04/25/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3571
False Positive
Unknown
Vendors

Apache

CVSS Score

7.5

5.0

Found a potential security threat?