Re: Dealing with an insecure Struts application on Tomcat

2023-10-20 Thread Christopher Schultz

Greg,

On 10/20/23 11:52, Greg Huber wrote:

Remember seeing this, a maintained version of Struts 1.  Might be work a
look.

https://github.com/weblegacy/struts1


This is interesting. I knew about this one:

https://github.com/kawasima/struts1-forever

But the weblegacy folks look *serious* about this: they even have a 
Jakarta EE-compatible release.


-chris


On Thu, 19 Oct 2023 at 17:45, Alan F  wrote:


I am looking at security steps to mitigate issues with a 1.x Struts based
app.

I have recommended the following until an upgrade resource is available

Remove application from current shared datasource
Remediate high risk CVE scored vulnerabilities (x4 with high EPSS rating)
Reduce exposure to internal audience.
Create new db and instance for above isolated datasource

Would you take it further and ensure this runs on it's own separate Tomcat
instance?
Any other recommendations?








-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Dealing with an insecure Struts application on Tomcat

2023-10-20 Thread Greg Huber
Remember seeing this, a maintained version of Struts 1.  Might be work a
look.

https://github.com/weblegacy/struts1

On Thu, 19 Oct 2023 at 17:45, Alan F  wrote:

> I am looking at security steps to mitigate issues with a 1.x Struts based
> app.
>
> I have recommended the following until an upgrade resource is available
>
> Remove application from current shared datasource
> Remediate high risk CVE scored vulnerabilities (x4 with high EPSS rating)
> Reduce exposure to internal audience.
> Create new db and instance for above isolated datasource
>
> Would you take it further and ensure this runs on it's own separate Tomcat
> instance?
> Any other recommendations?
>
>
>
>


Re: [OT] Dealing with an insecure Struts application on Tomcat

2023-10-19 Thread Christopher Schultz

Alan,

On 10/19/23 12:44, Alan F wrote:

I am looking at security steps to mitigate issues with a 1.x Struts based app.


Is this from a "Struts 1 is vulnerable" perspective? Because -- on paper 
-- it is. Vulnerable that is. But that doesn't necessarily mean that 
your application is vulnerable. I encourage you to read the CVEs 
associated with Struts 1 to see if they apply to you.



I have recommended the following until an upgrade resource is available

Remove application from current shared datasource
Remediate high risk CVE scored vulnerabilities (x4 with high EPSS rating)
Reduce exposure to internal audience.
Create new db and instance for above isolated datasource

Would you take it further and ensure this runs on it's own separate Tomcat 
instance?
Any other recommendations?


This depends upon what your threat model is. If the application seems 
like it's vulnerable, then isolating it from other applications may make 
some sense. But if your primary concern is access to the underlying 
data, then isolating the application won't protect the data.


I'm not sure what you mean by "shared data source". If you have a 
server-defined data source that is being shared by individual 
applications, then you probably just shouldn't be doing that in general.


Note that upgrading from Struts 1 to Struts 2 will probably require a 
complete rewrite of your application. :/


-chris

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Dealing with an insecure Struts application on Tomcat

2023-10-19 Thread Alan F
I am looking at security steps to mitigate issues with a 1.x Struts based app.

I have recommended the following until an upgrade resource is available

Remove application from current shared datasource
Remediate high risk CVE scored vulnerabilities (x4 with high EPSS rating)
Reduce exposure to internal audience.
Create new db and instance for above isolated datasource

Would you take it further and ensure this runs on it's own separate Tomcat 
instance?
Any other recommendations?