[ 
https://issues.apache.org/jira/browse/WW-4582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15090977#comment-15090977
 ] 

ASF GitHub Bot commented on WW-4582:
------------------------------------

Github user lukaszlenart commented on the pull request:

    https://github.com/apache/struts/pull/70#issuecomment-170333869
  
    This isn't really needed as access to `Class` is blocked for any Ognl 
expression, see [Internal Security 
Mechanism](http://struts.apache.org/docs/security.html#Security-Internalsecuritymechanism)


> adds 'class' to exclude params in ParametersInterceptor (avoid ClassLoader 
> manipulation)
> ----------------------------------------------------------------------------------------
>
>                 Key: WW-4582
>                 URL: https://issues.apache.org/jira/browse/WW-4582
>             Project: Struts 2
>          Issue Type: Bug
>          Components: Core Interceptors
>    Affects Versions: 2.3.24
>            Reporter: victorsosa
>            Assignee: Lukasz Lenart
>            Priority: Critical
>              Labels: security
>             Fix For: 2.3.25, 2.5
>
>
> Hi, 
> This is a permanent patch for security issue CVE-2014-0094; this adds 'class' 
> to exclude params in ParametersInterceptor (avoid ClassLoader manipulation)
> This is base on the information in the S2-020
> This close also the CVE-2014-0112, CVE-2014-0113 and CVE-2014-0116



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to