First published: Thu Jul 16 2015(Updated: )
The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to "compromise internal state of an application" via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts.xwork:xwork-core | >=2.0.0<2.3.20.1 | 2.3.20.1 |
maven/org.apache.struts:struts2-core | >=2.0.0<2.3.20.1 | 2.3.20.1 |
Apache Struts 2 | =2.3.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1831 has a medium severity rating due to its potential to compromise the internal state of applications depending on vulnerable versions of Apache Struts.
To fix CVE-2015-1831, upgrade Apache Struts to version 2.3.20.1 or later.
CVE-2015-1831 affects Apache Struts version 2.3.20 and earlier versions.
CVE-2015-1831 can be exploited by remote attackers to manipulate internal states of web applications.
No official workarounds are recommended for CVE-2015-1831; upgrading the affected software is advised.