You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@struts.apache.org by "Musachy Barroso (JIRA)" <ji...@apache.org> on 2008/08/21 23:55:24 UTC

[jira] Resolved: (WW-2779) Directory traversal vulnerability while serving static content

     [ https://issues.apache.org/struts/browse/WW-2779?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Musachy Barroso resolved WW-2779.
---------------------------------

    Resolution: Fixed

Fix committed to trunk and 2.0 branch

> Directory traversal vulnerability while serving static content
> --------------------------------------------------------------
>
>                 Key: WW-2779
>                 URL: https://issues.apache.org/struts/browse/WW-2779
>             Project: Struts 2
>          Issue Type: Bug
>          Components: Dispatch Filter
>    Affects Versions: 2.0.0
>            Reporter: Musachy Barroso
>            Priority: Blocker
>             Fix For: 2.1.2
>
>
> FilterDispatcher (in 2.0) and DefaultStaticContentLoader (in 2.1) have a security vulnerability that allows an attacker to traverse the directory structure and download files outside the "static" content folder, using double-encoded urls and relative paths, like:
> http://localhost:8080/struts2-blank-2.0.11.1/struts..
> http://localhost:8080/struts2-blank-2.0.11.1/struts/..%252f
> http://exampletomcat.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Login.class/
> Not all container are vulnerable to this, but Struts code needs to be fixed to avoid serving static content outside the static folders.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.