Apache Struts Critical Weakness Found, Patched

The open source framework for Java-based web apps has a critical flaw the Apache Software Foundation is trying to counter.

Larry Loeb, Blogger, Informationweek

August 24, 2018

3 Min Read

A critical-level remote code execution vulnerability (CVE-2018-11776) has been identified in Apache Struts. Struts is an open source framework used in the development of Java-based web apps. The vulnerability has been classified as critical because the flaw could allow remote attackers to execute their code on a server that is running the Struts-developed app.

The Apache Software Foundation announced that it has released a new version of Struts that patches the issue. Affected versions include Struts 2.3 through Struts 2.3.34, as well as Struts 2.5 through Struts 2.5.16. ASF strongly recommends that users upgrade to Struts 2.3.35 or Struts 2.5.17 immediately, even though a workaround that they characterize as "weak" is possible.

Adding urgency, Tenable has blogged, "A working proof of concept (PoC) has been discovered and verified on Github by Tenable's research team. In addition, there are indications that attackers are already probing for vulnerable Apache Struts instances."

Man Yue Mo from the Semmle Security Research team has been credited with identifying the problem.

A previous vulnerability in Struts (CVE-2017-5638) that was also discovered by Semmle has been blamed as the cause of the massive data breach that occurred at Equifax. In that instance, the financial records of more than 140 million users were exposed.

There are specific configurations of Struts that enable the vulnerability.

They are:

  1. The alwaysSelectFullNamespace flag is set to true in the Struts configuration. This automatically occurs if the application uses the Struts Convention plugin.

  2. The application's Struts configuration file contains an tag that does not specify the optional namespace attribute or specifies a wildcard namespace ("/*").

Dayne Topkin via Unsplash

Dayne Topkin via Unsplash

Semmle notes, "If your application's configuration does not meet these two conditions, you are likely not vulnerable to the two attack vectors described. However, new attack vectors that apply to different configurations may be discovered in the near future."

The researchers found that vulnerable applications may be attacked by threat actors injecting their own namespace as a parameter in an HTTP request. It seems that the value of that parameter is insufficiently validated by the Struts framework, and can be any OGNL string.

OGNL ("Object-Graph Navigation Language") is a domain-specific language that is used to customize Apache Struts' behavior.

Mo describes the process that led to the exposure of the vulnerability in a blog. He looks at the underlying data flow of Struts and how libraries that are used in determining results will affect it.

He also wonders how this vulnerability was missed by everyone. He thinks they were just not looking widely enough.

He notes in the blog that, "In my opinion, it's because the similarities between [previous vulnerabilities] are, in a sense, local, in that they all occur in a similar location in the source code (all in the Rest plugin). They are linked by the tainted source, rather than the location of the source code, so any software or tool that would successfully find variants like this would need to be able to perform […] semantic analysis across the whole code base."

What should worry the security professional is that further vulnerabilities may be exposed by this approach to Struts. Attention in the upcoming days will be needed.

Correction (8/24/2018): This article was updated to correct the mention of the Equifax breach that had identified the company as Experian.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Read more about:

Security Now

About the Author(s)

Larry Loeb

Blogger, Informationweek

Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. He has written a book on the Secure Electronic Transaction Internet protocol. His latest book has the commercially obligatory title of Hack Proofing XML. He's been online since uucp "bang" addressing (where the world existed relative to !decvax), serving as editor of the Macintosh Exchange on BIX and the VARBusiness Exchange. His first Mac had 128 KB of memory, which was a big step up from his first 1130, which had 4 KB, as did his first 1401. You can e-mail him at [email protected].

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights