You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@struts.apache.org by "Rene Gielen (JIRA)" <ji...@apache.org> on 2008/10/15 21:32:36 UTC
[jira] Assigned: (WW-2779) Directory traversal vulnerability while
serving static content
[ https://issues.apache.org/struts/browse/WW-2779?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Rene Gielen reassigned WW-2779:
-------------------------------
Assignee: Musachy Barroso
> Directory traversal vulnerability while serving static content
> --------------------------------------------------------------
>
> Key: WW-2779
> URL: https://issues.apache.org/struts/browse/WW-2779
> Project: Struts 2
> Issue Type: Bug
> Components: Dispatch Filter
> Affects Versions: 2.0.0
> Reporter: Musachy Barroso
> Assignee: Musachy Barroso
> Priority: Blocker
> Fix For: 2.0.12, 2.1.3
>
>
> FilterDispatcher (in 2.0) and DefaultStaticContentLoader (in 2.1) have a security vulnerability that allows an attacker to traverse the directory structure and download files outside the "static" content folder, using double-encoded urls and relative paths, like:
> http://localhost:8080/struts2-blank-2.0.11.1/struts..
> http://localhost:8080/struts2-blank-2.0.11.1/struts/..%252f
> http://exampletomcat.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Login.class/
> Not all container are vulnerable to this, but Struts code needs to be fixed to avoid serving static content outside the static folders.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.