Directory traversal vulnerability
---------------------------------

                 Key: WW-2779
                 URL: https://issues.apache.org/struts/browse/WW-2779
             Project: Struts 2
          Issue Type: Bug
          Components: Dispatch Filter
    Affects Versions: 2.0.0
            Reporter: Musachy Barroso
            Priority: Blocker
             Fix For: 2.1.2


FilterDispatcher (in 2.0) and DefaultStaticContentLoader (in 2.1) have a 
security vulnerability that allows an attacker to traverse the directory 
structure and download files outside the "static" content folder, using 
double-encoded urls and relative paths, like:

http://localhost:8080/struts2-blank-2.0.11.1/struts..

http://localhost:8080/struts2-blank-2.0.11.1/struts/..%252f

http://exampletomcat.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Login.class/

Not all container are vulnerable to this, but Struts code needs to be fixed to 
avoid serving static content outside the static folders.



-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to