First published: Wed May 07 2014(Updated: )
Apache Struts is a framework for building web applications with Java.<br>It was found that the Struts 1 ActionForm object allowed access to the<br>'class' parameter, which is directly mapped to the getClass() method. A<br>remote attacker could use this flaw to manipulate the ClassLoader used by<br>an application server running Struts 1. This could lead to remote code<br>execution under certain conditions. (CVE-2014-0114)<br>All struts users are advised to upgrade to these updated packages, which<br>contain a backported patch to correct this issue. All running applications<br>using struts must be restarted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/struts | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-debuginfo | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-javadoc | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-manual | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-webapps-tomcat5 | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-debuginfo | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-javadoc | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-manual | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
redhat/struts-webapps-tomcat5 | <1.2.9-4jpp.8.el5_10 | 1.2.9-4jpp.8.el5_10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:0474 is classified as important.
To fix RHSA-2014:0474, update the struts package to version 1.2.9-4jpp.8.el5_10 or later.
RHSA-2014:0474 addresses vulnerabilities related to improper access control in the Struts 1 ActionForm object.
Struts versions prior to 1.2.9-4jpp.8.el5_10 are affected by RHSA-2014:0474.
There are no specific workarounds for RHSA-2014:0474; the best action is to apply the recommended update.