Apache Struts 2 2.3.20 through 2.3.28.1 mishandles token validation, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unspecified vectors.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://struts.apache.org/docs/s2-038.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1348249 | issue tracking |
http://www-01.ibm.com/support/docview.wss?uid=swg21987854 | third party advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000111 | vdb entry third party advisory vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1009282 | third party advisory |
http://jvn.jp/en/jp/JVN45093481/index.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/91281 | vdb entry |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html |