First published: Wed Sep 20 2017(Updated: )
If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-core | >=2.5.0<2.5.13 | 2.5.13 |
Apache Struts 2 | =2.5 | |
Apache Struts 2 | =2.5.1 | |
Apache Struts 2 | =2.5.2 | |
Apache Struts 2 | =2.5.3 | |
Apache Struts 2 | =2.5.4 | |
Apache Struts 2 | =2.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8738 has a high severity rating due to its potential for denial of service attacks.
To fix CVE-2016-8738, upgrade to Apache Struts version 2.5.13 or later.
CVE-2016-8738 affects Apache Struts versions 2.5.0 to 2.5.5.
CVE-2016-8738 enables denial of service attacks through specially crafted URLs.
CVE-2016-8738 is exploitable in configurations where user input is directly fed into the URL validation process.