Number:IRCNE2014042178
Date: 2014-04-29
According to “computerworld”, the Apache Software Foundation rushed last week to update the popular Apache Struts framework after a previous security patch for a high-risk vulnerability proved to be incomplete.
The newly released Struts 2.3.16.2 strengthens the protection against a ClassLoader manipulation issue through the ParametersInterceptor feature that was thought to have been resolved in March in Struts 2.3.16.1.
The Struts developers warned users Thursday that the previous patch was insufficient and provided manual mitigation instructions until a new version of the framework for developing Java Web applications was ready.
Struts 2.3.16.2 was released later that day and extends the fix to CookieInterceptor, another functionality that according to a new advisory is vulnerable to the same type of ClassLoader manipulation attack when configured to accept all cookies.
Attackers have exploited remote code execution vulnerabilities in Apache Struts in the past to compromise servers that hosted applications developed with the framework. Security researchers from Trend Micro reported in August that Chinese hackers had created an automated tool for exploiting known Struts vulnerabilities.
The fact that attackers are interested in Struts increases the risk of attacks for users, so upgrading to the newly released Struts 2.3.16.2 as soon as possible is highly recommended.
There are also third-party products that include Struts and might need to be patched because of this flaw. For example, in the past, Cisco Systems updated several of its products in order to integrate a Struts patch for a critical vulnerability.
- 5