[
https://issues.apache.org/struts/browse/WW-2779?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Rene Gielen reassigned WW-2779:
-------------------------------
Assignee: Musachy Barroso
> Directory traversal vulnerability while serving static content
> --------------------------------------------------------------
>
> Key: WW-2779
> URL: https://issues.apache.org/struts/browse/WW-2779
> Project: Struts 2
> Issue Type: Bug
> Components: Dispatch Filter
> Affects Versions: 2.0.0
> Reporter: Musachy Barroso
> Assignee: Musachy Barroso
> Priority: Blocker
> Fix For: 2.0.12, 2.1.3
>
>
> FilterDispatcher (in 2.0) and DefaultStaticContentLoader (in 2.1) have a
> security vulnerability that allows an attacker to traverse the directory
> structure and download files outside the "static" content folder, using
> double-encoded urls and relative paths, like:
> http://localhost:8080/struts2-blank-2.0.11.1/struts..
> http://localhost:8080/struts2-blank-2.0.11.1/struts/..%252f
> http://exampletomcat.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Login.class/
> Not all container are vulnerable to this, but Struts code needs to be fixed
> to avoid serving static content outside the static folders.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.