Adds new announcement

Project: http://git-wip-us.apache.org/repos/asf/struts-site/repo
Commit: http://git-wip-us.apache.org/repos/asf/struts-site/commit/563d943e
Tree: http://git-wip-us.apache.org/repos/asf/struts-site/tree/563d943e
Diff: http://git-wip-us.apache.org/repos/asf/struts-site/diff/563d943e

Branch: refs/heads/master
Commit: 563d943ee4da41046d7d39dde18b8539023410f1
Parents: 0e3b967
Author: Lukasz Lenart <[email protected]>
Authored: Fri May 8 08:43:40 2015 +0200
Committer: Lukasz Lenart <[email protected]>
Committed: Fri May 8 08:43:40 2015 +0200

----------------------------------------------------------------------
 source/announce.md | 168 ++----------------------------------------------
 1 file changed, 7 insertions(+), 161 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/struts-site/blob/563d943e/source/announce.md
----------------------------------------------------------------------
diff --git a/source/announce.md b/source/announce.md
index 6fc205a..ac62f0c 100644
--- a/source/announce.md
+++ b/source/announce.md
@@ -5,12 +5,12 @@ title: Announcements
 # Announcements
 
 <p class="pull-right">
-  Skip to: <a href="announce-2013.html">Announcements - 2013</a>
+  Skip to: <a href="announce-2014.html">Announcements - 2014</a>
 </p>
 
-####  7 December 2014 - Struts 2.3.20 General Availability with Security Fix 
Release {#a20141207}
+#### 6 May 2015 - Struts 2.3.20.1 General Availability with Security Fix 
Release {#a20150506}
 
-The Apache Struts group is pleased to announce that Struts 2.3.20 is available 
as a "General Availability"
+The Apache Struts group is pleased to announce that Struts 2.3.20.1 is 
available as a "General Availability"
 release. The GA designation is our highest quality grade.
 
 Apache Struts 2 is an elegant, extensible framework for creating 
enterprise-ready Java web applications.
@@ -19,33 +19,8 @@ to maintaining applications over time.
 
 One medium security issue was solved with this release:
 
-  - [S2-023](http://struts.apache.org/docs/s2-023.html)
-    Generated value of token can be predictable
-
-Besides that, this release contains several fixes and improvements just to 
mention few of them:
-
-  - merged security fixes from version 2.3.16.1, 2.3.16.2, 2.3.16.3
-  - extended existing security mechanism to block access to given Java 
packages and Classes
-  - collection Parameters for `RedirectResult`
-  - make `ParametersInterceptor` supports chinese in hash key by default
-  - `themes.properties` can be loaded using `ServletContext` allows to put 
template folder under WEB-INF or on classpath
-  - new tag `datetextfield`
-  - only valid Ognl expressions are cached
-  - custom `TextProvider` can be used for validation errors of model driven 
actions
-  - `datetimepicker`'s label fixed
-  - `PropertiesJudge` removed and properties are checked in 
`SecurityMemberAccess`
-  - resource reloading works in IBM JVM
-  - default reloading settings were removed from default.properties
-  - `commons-fileupload` library upgraded to version 1.3.1 to fix potential 
security vulnerability
-  - the scheme attribute accepts expressions in `s:url` tag
-  - solves problem with infinite loop in `FastByteArrayOutputStream`
-  - `LocalizedTextUtil` supports many ClassLoaders
-  - Bill of Materials pom was introduced
-  - `debug=browser|console` was migrated to jQuery
-  - `struts_dojo.js` was fixed
-  - interface `org/apache/struts2/views/TagLibrary` was restored and marked as 
`@Depreacted`
-
-and many other small improvements, please careful read the [version 
notes](http://struts.apache.org/docs/version-notes-2320.html).
+  - [S2-024](/docs/s2-024.html)
+    Wrong `excludeParams` overrides those defined in 
`DefaultExcludedPatternsChecker`
 
 **All developers are strongly advised to perform this action.**
 
@@ -55,140 +30,11 @@ Servlet API 2.4, JSP API 2.0, and Java 5.
 Should any issues arise with your use of any version of the Struts framework,
 please post your comments to the user list, and, if appropriate, file a 
tracking ticket.
 
-#### 3 May 2014 - Struts 2.3.16.3 General Availability Release - Security Fix 
Release {#a20140503}
-
-The Apache Struts group is pleased to announce that Struts 2.3.16.3 is 
available as a "General Availability"
-release. The GA designation is our highest quality grade.
-
-Apache Struts 2 is an elegant, extensible framework for creating 
enterprise-ready Java web applications.
-The framework is designed to streamline the full development cycle, from 
building, to deploying,
-to maintaining applications over time.
-
-One medium security issue was solved with this release:
-
-  - [S2-022](http://struts.apache.org/docs/s2-022.html)
-    Extends excluded params in CookieInterceptor to avoid manipulation of 
Struts' internals
-
-All developers are strongly advised to perform this action.
-
-#### 24 April 2014 - Struts 2.3.16.2 General Availability Release - Security 
Fix Release {#a20140424}
-
-The Apache Struts group is pleased to announce that Struts 2.3.16.2 is 
available as a "General Availability"
-release. The GA designation is our highest quality grade.
-
-Apache Struts 2 is an elegant, extensible framework for creating 
enterprise-ready Java web applications.
-The framework is designed to streamline the full development cycle, from 
building, to deploying,
-to maintaining applications over time.
-
-Two security issues were solved with this release:
-
-  - [S2-021](http://struts.apache.org/docs/s2-021.html)
-    Improves excluded params to avoid ClassLoader manipulation via 
ParametersInterceptor
-  - [S2-021](http://struts.apache.org/docs/s2-021.html)
-    Adds excluded params to CookieInterceptor to avoid ClassLoader 
manipulation when the interceptors is configured
-    to accept all cookie names (wildcard matching via "*")
-
-All developers are strongly advised to perform this action.
-
-#### 24 April 2014 - Struts up to 2.3.16.1: Zero-Day Exploit Mitigation 
{#a20140424}
-
-In Struts 2.3.16.1, an issue with ClassLoader manipulation via request 
parameters was supposed to be resolved. Unfortunately, 
-the correction wasn't sufficient.
-
-A security fix release fully addressing this issue is in preparation and will 
be released as soon as possible.
-
-Once the release is available, all Struts 2 users are strongly recommended to 
update their installations.
-
-**Until the release is available, all Struts 2 users are strongly recommended 
to apply the following mitigation:**
-
-In your struts.xml, replace all custom references to params-interceptor with 
the following code, especially regarding the class-pattern
-found at the beginning of the excludeParams list:
-
-    <interceptor-ref name="params">
-       <param 
name="excludeParams">(.*\.|^|.*|\[('|"))(c|C)lass(\.|('|")]|\[).*,^dojo\..*,^struts\..*,^session\..*,^request\..*,^application\..*,^servlet(Request|Response)\..*,^parameters\..*,^action:.*,^method:.*</param>
-    </interceptor-ref>
-
-If you are using default interceptor stacks packaged in struts-default.xml, 
change your parent packages to a customized secured configuration
-as in the following example. Given you are using defaultStack so far, change 
your packages from
-
-    <package name="default" namespace="/" extends="struts-default">
-        <default-interceptor-ref name="defaultStack" />
-        ...
-        ...
-    </package>
-
-to
-
-    <package name="default" namespace="/" extends="struts-default">
-        <interceptors>
-            <interceptor-stack name="secureDefaultStack">
-                <interceptor-ref name="defaultStack">
-                    <param 
name="params.excludeParams">(.*\.|^|.*|\[('|"))(c|C)lass(\.|('|")]|\[).*,^dojo\..*,^struts\..*,^session\..*,^request\..*,^application\..*,^servlet(Request|Response)\..*,^parameters\..*,^action:.*,^method:.*</param>
-                </interceptor-ref>
-            </interceptor-stack>
-        </interceptors>
-
-        <default-interceptor-ref name="secureDefaultStack" />
-        ...
-    </package> 
-
-Please follow the Apache Struts Announcements to stay updated regarding the 
upcoming security release. Most likely the release will be available within the 
next 72 hours.
-Please prepare for upgrading all Struts 2 based production systems to the new 
release version once available.
-
-#### 2 March 2014 - Struts 2.3.16.1 General Availability Release - Security 
Fix Release {#a20140302}
-
-The Apache Struts group is pleased to announce that Struts 2.3.16.1 is 
available as a "General Availability"
-release. The GA designation is our highest quality grade.
-
-Apache Struts 2 is an elegant, extensible framework for creating 
enterprise-ready Java web applications.
-The framework is designed to streamline the full development cycle, from 
building, to deploying,
-to maintaining applications over time.
-
-Two security issues were solved with this release:
-
-  - [S2-020](http://struts.apache.org/docs/s2-020.html) ClassLoader 
manipulation
-    via request parameters
-  - [S2-020](http://struts.apache.org/docs/s2-020.html) Commons FileUpload 
library was upgraded
-    to version 1.3.1 to prevent DoS attacks
-
-All developers are strongly advised to perform this action.
-
-#### 21 February 2014 - Immediately upgrade commons-fileupload to version 
1.3.1 {#a20140221}
-
-The Apache Struts Team recommends to immediately upgrade your Struts 2
-based projects to use the latest released version of Commons
-FileUpload library, which is currently 1.3.1. This is necessary to
-prevent your publicly accessible web site from being exposed to
-possible DoS attacks (see \[1] \[2]).
-
-Your project is affected if it uses the built-in file upload mechanism
-of Struts 2, which defaults to the use of commons-fileupload. The
-updated commons-fileupload library is a drop-in replacement for the
-vulnerable version. Deployed applications can be hardened by replacing
-the commons-fileupload jar file in WEB-INF/lib with the fixed jar. For
-Maven based Struts 2 projects, the following dependency needs to be
-added:
-
-    <dependency>
-      <groupId>commons-fileupload</groupId>
-      <artifactId>commons-fileupload</artifactId>
-      <version>1.3.1</version>
-    </dependency>
-
-More details can be found here:
-
-  1. <a 
href="http://commons.apache.org/proper/commons-fileupload/changes-report.html#a1.3.1";>
-      
http://commons.apache.org/proper/commons-fileupload/changes-report.html#a1.3.1</a>
-  2. <a 
href="http://mail-archives.apache.org/mod_mbox/www-announce/201402.mbox/%[email protected]%3E";>
-      
http://mail-archives.apache.org/mod_mbox/www-announce/201402.mbox/%[email protected]%3E</a>
-
-All developers are strongly advised to perform this action.
-
 <p class="pull-right">
-  Skip to: <a href="announce-2013.html">Announcements - 2013</a>
+  Skip to: <a href="announce-2014.html">Announcements - 2014</a>
 </p>
 
 <p class="pull-left">
   <strong>Next:</strong>
   <a href="kickstart.html">Kickstart FAQ</a>
-</p>
\ No newline at end of file
+</p>

Reply via email to