Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:APACHE:STRUTS-SECBYPASS

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Apache Struts Improper classLoader Parameter Handling Security Bypass

Release Date

2014/04/25

Update Number

2368

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Apache Struts Improper classLoader Parameter Handling Security Bypass


This signature detects attempts to exploit a known vulnerability against Apache Struts. A successful attack can allow an attacker to bypass the Java security policies and load malicious class files. Successful exploitation of this vulnerability can lead to arbitrary code execution.

Extended Description

Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.

Affected Products

  • Apache commons_beanutils 1.9.1
  • Apache struts 1.0
  • Apache struts 1.0.2
  • Apache struts 1.1
  • Apache struts 1.2.2
  • Apache struts 1.2.4
  • Apache struts 1.2.6
  • Apache struts 1.2.7
  • Apache struts 1.2.8
  • Apache struts 1.2.9
  • Apache struts 1.3.10
  • Apache struts 1.3.5
  • Apache struts 1.3.8

References

  • BugTraq: 65999
  • BugTraq: 67121
  • CVE: CVE-2014-0112
  • CVE: CVE-2014-0113
  • CVE: CVE-2014-0094
  • CVE: CVE-2014-0114
  • URL: https://github.com/rgielen/struts1filter/tree/develop
  • URL: http://www.pwntester.com/blog/2014/04/24/struts2-0day-in-the-wild/
  • URL: http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Update-your-Struts-1-ClassLoader-manipulation-filters/ba-p/6639204
  • URL: http://struts.apache.org/release/2.3.x/docs/s2-020.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out