微慑信息网

CVE-2017-15707之漏洞详情

Summary
A crafted JSON request can be used to perform a DoS attack when using the Struts REST plugin
Who should read this
All Struts 2 developers and users which are using the REST plugin
Impact of vulnerability
A DoS attack is possible when using outdated json-lib with the Struts REST plugin
Maximum security rating
Medium
Recommendation
Upgrade to Struts 2.5.14.1
Affected Software
Struts 2.5 – Struts 2.5.14
Reporter
Huijun Chen, XiaoLong Zhu – Huawei Technologies
CVE Identifier
CVE-2017-15707
Problem
The REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
Solution
Upgrade to Apache Struts version 2.5.14.1. Another solution is to use the Jackson handler instead of the default JSON-lib handler as described here.
Backward compatibility
No backward incompatibility issues are expected.
Workaround
Use Jackson handler instead of the default JSON-lib handler as described here.

赞(0) 打赏
转载请附本站链接,未经允许不得转载,,谢谢:微慑信息网-VulSee.com » CVE-2017-15707之漏洞详情

评论 抢沙发

微慑信息网 专注工匠精神

微慑信息网-VulSee.com-关注前沿安全态势,聚合网络安全漏洞信息,分享安全文档案例

访问我们联系我们

觉得文章有用就打赏一下文章作者

非常感谢你的打赏,我们将继续提供更多优质内容,让我们一起创建更加美好的网络世界!

支付宝扫一扫打赏

微信扫一扫打赏

登录

找回密码

注册