Apache Struts DefaultActionMapper redirect Prefix Vulnerability
Added: 08/01/2013CVE: CVE-2013-2251
BID: 61189
OSVDB: 95405
Background
Apache Struts is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model-view-controller (MVC) architecture.Struts uses Object-Graph Navigation Language (OGNL) to provide extensive expression evaluation capabilities.
Problem
The DefaultActionMapper in Struts 2 versions prior to 2.3.15.1 does not properly handle parameters with a crafted redirect: prefix. This could allow remote attackers to execute arbitrary OGNL code.Resolution
Upgrade to Struts 2.3.15.1 or higher.References
http://struts.apache.org/development/2.x/docs/s2-016.htmlLimitations
This exploit was tested against Apache Software Foundation Struts 2.3.1.1 on Windows Server 2003 SP2 English (DEP OptOut) and Windows Server 2008 SP2 (DEP OptOut).This exploit requires that the Struts Action URL be provided.
Platforms
WindowsBack to exploit index