RE: CVE-2015-5209

2016-02-22 Thread Martin Gainty
Hi Brent apply following regex to exclude vulnerable parameters from Request "(^|\\%\\{)((#?)(top(\\.|\\['|\\[\")|\\[\\d\\]\\.)?)(dojo|struts|session|request|response|application|servlet(Request|Response|Context)|parameters|context|_memberAccess)(\\.|\\[).*","^(action|method):.*"

CVE-2015-5209

2016-02-22 Thread Brent Barker
Hi, We are upgrading struts to patch a potential security hole (S2-026 ) I want to ensure the vulnerability no longer exists in our application after upgrading to v2.3.24.1. Would someone mind pointing me in the right direction to test the