Home > Security Bulletins > S2-042 |
Who should read this | All Struts 2 developers and users |
---|---|
Impact of vulnerability | Possible path traversal in the Convention plugin in Struts 2.3.20 - 2.3.30 |
Maximum security rating | High |
Recommendation | Upgrade to Struts 2.3.31 or to any version of Struts 2.5 |
Affected Software | Struts 2.3.20 - Struts 2.3.31 |
Reporter | Takeshi Terada of Mitsui Bussan Secure Directions, Inc. |
CVE Identifier | CVE-2016-6795 |
It is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
Upgrade to Apache Struts version 2.3.31 when you are using Struts 2.3.20 - 2.3.30 with the Convention plugin.
No backward incompatibility issues are expected.
There is no known workaround for this vulnerability, please upgrade to the mentioned Struts versions.