java - Struts 2 S2-016 Vulenerability Mitigation Till Upgrade -


recently struts patched vulnerability allowing attackers execute remote code. apparently not patching giving black-hats red carpet welcome bandwagon :-/

http://struts.apache.org/release/2.3.x/docs/s2-016.html

basically allows attack command execution :

legit action : http://host/struts2-showcase/employee/save.action?redirect:%25{3*4} exploited action : http://host/struts2-showcase/employee/save.action?redirect:%25{(new+java.lang.processbuilder(new+java.lang.string[]{'command','goes','here'})).start()}

while know upgrading should done asap, possible mean time since our code base uses old struts versions , plugins.

which require refactoring upgrade struts 2 libraries, need tested etc.

my question therefor whether has idea stop vulnerability being executed? till able upgrade.

i wondering whether writing interceptor sanitize url before being evaluated against ognl possible , if mitigate issue?

other idea had use java security manager somehow stop arbitrary process invocations, possible? patch hole temporary?

the server being used jboss if think that's relevant.

the problem related defaultactionmapper , how handles special parameters. class extended override handlespecialparameters method. however, if turn off dmi these special parameters no longer work. use constant configuration

<constant name="struts.enable.dynamicmethodinvocation" value="false"/> 

Comments

Popular posts from this blog

basic authentication with http post params android -

vb.net - Virtual Keyboard commands -

css - Firefox for ubuntu renders wrong colors -