Summary
A crafted JSON request can be used to perform a DoS attack when using the Struts REST plugin
Who should read this
All Struts 2 developers and users which are using the REST plugin
Impact of vulnerability
A DoS attack is possible when using outdated json-lib with the Struts REST plugin
Maximum security rating
Medium
Recommendation
Upgrade to Struts 2.5.14.1
Affected Software
Struts 2.5 – Struts 2.5.14
Reporter
Huijun Chen, XiaoLong Zhu – Huawei Technologies
CVE Identifier
CVE-2017-15707
Problem
The REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
Solution
Upgrade to Apache Struts version 2.5.14.1. Another solution is to use the Jackson handler instead of the default JSON-lib handler as described here.
Backward compatibility
No backward incompatibility issues are expected.
Workaround
Use Jackson handler instead of the default JSON-lib handler as described here.
CVE-2017-15707之漏洞详情
转载请附本站链接,未经允许不得转载,,谢谢:微慑信息网-VulSee.com » CVE-2017-15707之漏洞详情