Apache Struts 2 Security Bypass Vulnerabilities (May 8, 2014)

By

Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model-view-controller (MVC) architecture.

Several security bypass vulnerabilities exist in Apache Struts. Specifically, the vulnerabilities are due to design errors that allow any user to manipulate a ClassLoader. A remote attacker could exploit these vulnerabilities by sending a crafted HTTP request to the target server. Successful exploitation would allow the attacker to access and manipulate Java ClassLoader objects associated with the Apache Struts application.

Dell SonicWALL has researched the vulnerabilities and released the following signature(s) to detect and block specific exploitation attempts targeting these vulnerabilities:

  • IPS 3720 “Apache Struts ClassLoader Manipulation 1”
  • IPS 3778 “Apache Struts ClassLoader Manipulation 2”

CVE-2014-0094, CVE-2014-0112, CVE-2014-0113 and CVE-2014-0114 are related to the vulnerabilities mentioned above.

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.