[ 
https://issues.apache.org/jira/browse/WW-5055?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart closed WW-5055.
-----------------------------
    Resolution: Not A Problem

The latest version of Struts has a blacklisting mechanism in-place [1] and 
{{Runtime}} is one of the excluded classes, you can check the whole list here 
[2]

[1] https://struts.apache.org/security/#internal-security-mechanism
[2] 
https://github.com/apache/struts/blob/master/core/src/main/resources/struts-default.xml#L39-L76

For future please report any Security related topics to this list
[email protected]

> Fix for security vulnerability CVE-2012-1592 identified in the National 
> Vulnerability Database
> ----------------------------------------------------------------------------------------------
>
>                 Key: WW-5055
>                 URL: https://issues.apache.org/jira/browse/WW-5055
>             Project: Struts 2
>          Issue Type: Improvement
>            Reporter: Jack Hagan
>            Priority: Major
>              Labels: security
>
> h2. CVE-2012-1592 Detail
> h3. Current Description
> A local code execution issue exists in Apache Struts2 when processing 
> malformed XSLT files, which could let a malicious user upload and execute 
> arbitrary files.
> See a bug report at the following URL:
> [http://seclists.org/bugtraq/2012/Mar/110]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to