First published: Thu Mar 30 2006(Updated: )
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts 2 | <=1.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1546 has a medium severity rating due to the potential for remote attackers to bypass validation.
To fix CVE-2006-1546, upgrade Apache Struts to version 1.2.9 or later.
CVE-2006-1546 affects all versions of Apache Struts prior to 1.2.9.
CVE-2006-1546 allows exploitation through crafted requests containing 'org.apache.struts.taglib.html.Constants.CANCEL' parameters.
Recommended mitigations for CVE-2006-1546 include applying input validation and upgrading to a patched version of Struts.