Описание
Cross-Site Request Forgery in Apache Struts
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-7809
- https://github.com/apache/struts/commit/1f301038a751bf16e525607c3db513db835b2999
- https://web.archive.org/web/20150201180327/http://www.securitytracker.com/id/1031309
- https://web.archive.org/web/20150820131625/http://www.securityfocus.com/bid/71548
- https://web.archive.org/web/20201023114849/http://www.securityfocus.com/archive/1/534175/100/0/threaded
- http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html
- http://struts.apache.org/docs/s2-023.html
Пакеты
org.apache.struts:struts2-core
< 2.3.20
2.3.20
Связанные уязвимости
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:to ...
Уязвимость программной платформы Apache Struts, связанная с использованием предсказуемых значений <s:token/>, позволяющая удаленному нарушителю осуществить CSRF-атаку