First published: Mon Apr 28 2014(Updated: )
It was found that the Struts 1 ActionForm object allowed access to the 'class' parameter, which is directly mapped to the getClass() method. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. This could lead to remote code execution under certain conditions. The root cause of this issue is the fact that commons-beanutils exposes the class property by default, with no mechanism to disable access to it. If a framework built on commons-beanutils does not otherwise suppress access to the class property, then a remote attacker could use this flaw to manipulate the ClassLoader used by the underlying container. This could lead to remote code execution under certain conditions. commons-beanutils 1.9.2 has now shipped, including a specialized BeanIntrospector implementation that allows suppressing properties. Frameworks built on commons-beantutils can make use of the new pre-configured SuppressPropertiesBeanIntrospector to address this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | ||
Apache commons-beanutils | <1.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1091938 is high due to the potential for remote code execution.
To fix REDHAT-BUG-1091938, upgrade to a version of Apache Struts 1 that does not allow access to the 'class' parameter.
Apache Struts 1 is affected by REDHAT-BUG-1091938 without specific version exclusions.
Yes, REDHAT-BUG-1091938 can be exploited remotely by attackers to manipulate the ClassLoader.
The risk associated with REDHAT-BUG-1091938 involves the potential for an attacker to execute arbitrary code on the server.