Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://issues.apache.org/jira/browse/WW-3631 | vendor advisory issue tracking |
http://secunia.com/advisories/47109 | third party advisory permissions required |
https://issues.apache.org/jira/browse/WW-2264 | vendor advisory issue tracking |
http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html | third party advisory |