Directory traversal vulnerability
---------------------------------
Key: WW-2779
URL: https://issues.apache.org/struts/browse/WW-2779
Project: Struts 2
Issue Type: Bug
Components: Dispatch Filter
Affects Versions: 2.0.0
Reporter: Musachy Barroso
Priority: Blocker
Fix For: 2.1.2
FilterDispatcher (in 2.0) and DefaultStaticContentLoader (in 2.1) have a
security vulnerability that allows an attacker to traverse the directory
structure and download files outside the "static" content folder, using
double-encoded urls and relative paths, like:
http://localhost:8080/struts2-blank-2.0.11.1/struts..
http://localhost:8080/struts2-blank-2.0.11.1/struts/..%252f
http://exampletomcat.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Login.class/
Not all container are vulnerable to this, but Struts code needs to be fixed to
avoid serving static content outside the static folders.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.