First published: Thu Mar 06 2014(Updated: )
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Struts | <2.3.16.2 | 2.3.16.2 |
maven/org.apache.struts.xwork:xwork-core | >=2.0.0<2.3.16.2 | 2.3.16.2 |
maven/org.apache.struts:struts2-core | >=2.0.0<2.3.16.2 | 2.3.16.2 |
Apache Struts 2 | >=2.0.0<2.3.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0094 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2014-0094, upgrade Apache Struts to version 2.3.16.2 or later.
CVE-2014-0094 is caused by improper handling of the class parameter in the ParametersInterceptor component of Apache Struts.
CVE-2014-0094 affects all versions of Apache Struts prior to 2.3.16.2.
You can determine if your application is vulnerable to CVE-2014-0094 by checking if it is running an affected version of Apache Struts before 2.3.16.2.