Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://issues.apache.org/struts/browse/WW-2779 | |
http://struts.apache.org/2.x/docs/s2-004.html | vendor advisory |
http://www.vupen.com/english/advisories/2008/3003 | vdb entry vendor advisory |
http://secunia.com/advisories/32497 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/32104 | vdb entry vendor advisory |
http://osvdb.org/49733 | vdb entry |
http://osvdb.org/49734 | vdb entry |