You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@struts.apache.org by "Deborah White (JIRA)" <ji...@apache.org> on 2017/07/13 20:30:00 UTC
[jira] [Created] (WW-4815) Struts 2.3.16.3 to 2.3.32
Deborah White created WW-4815:
---------------------------------
Summary: Struts 2.3.16.3 to 2.3.32
Key: WW-4815
URL: https://issues.apache.org/jira/browse/WW-4815
Project: Struts 2
Issue Type: Temp
Components: Other
Affects Versions: 2.3.32
Reporter: Deborah White
I need some assistance and am hoping you can provide some insight. I know this is probably not the place to do this, but I'm not finding answers elsewhere. I am updating from 2.3.16.3 to 2.3.32 due to the vulnerability. The problem is that the excluded classes in the struts-default.xml are being used by my application and I certainly do not have time to do a rewrite.
This is the Warning I get and then my application does not run as it should because it seems it is not forwarding the roles:
WARN [com.opensymphony.xwork2.ognl.SecurityMemberAccess] Package of target [org.apache.struts2.dispatcher.StrutsRequestWrapper@42f3b47f] or package of member [public boolean javax.servlet.http.HttpServletRequestWrapper.isUserInRole(java.lang.String)] are excluded!
I need to know how I can safely modify the struts-default.xml and still have the fix for the vulnerability. Also, if there is something I can instead include in my struts.xml file that would override, that would be better. Thank you.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)