First published: Mon Apr 28 2014(Updated: )
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/struts | <0:1.2.9-4jpp.8.el5_10 | 0:1.2.9-4jpp.8.el5_10 |
redhat/struts | <0:1.3.10-6.ep5.el6 | 0:1.3.10-6.ep5.el6 |
Apache Commons BeanUtils | <=1.9.1 | |
Apache Struts | =1.0 | |
Apache Struts | =1.0.2 | |
Apache Struts | =1.1 | |
Apache Struts | =1.1-b1 | |
Apache Struts | =1.1-b2 | |
Apache Struts | =1.1-b3 | |
Apache Struts | =1.1-rc1 | |
Apache Struts | =1.1-rc2 | |
Apache Struts | =1.2.2 | |
Apache Struts | =1.2.4 | |
Apache Struts | =1.2.6 | |
Apache Struts | =1.2.7 | |
Apache Struts | =1.2.8 | |
Apache Struts | =1.2.9 | |
Apache Struts | =1.3.5 | |
Apache Struts | =1.3.8 | |
Apache Struts | =1.3.10 | |
maven/commons-beanutils:commons-beanutils | >=1.8.0<1.9.4 | 1.9.4 |
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.VCaGk3V53Ua
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2014-0114 is classified as a moderate severity vulnerability.
To mitigate CVE-2014-0114, update Apache Commons BeanUtils to version 1.9.4 or later.
CVE-2014-0114 affects Apache Struts versions up to 1.3.10 and Apache Commons BeanUtils versions up to 1.9.1.
Yes, CVE-2014-0114 allows remote attackers to manipulate the ClassLoader, which can lead to remote code execution.
Yes, patches are available in updated versions of Apache Commons BeanUtils and Apache Struts.