This is an automated email from the ASF dual-hosted git repository. lukaszlenart pushed a commit to branch contributors-guide in repository https://gitbox.apache.org/repos/asf/struts-site.git
commit a6a7a220b458329c6a2c071f92ef7c9635f89464 Author: Rene Gielen <rgie...@apache.org> AuthorDate: Thu Aug 13 12:06:45 2020 +0200 Add Announcement 2020-08-13 --- source/announce.md | 48 ++++++++++++++++++++++++++++++++++++++++++++++++ source/index.html | 40 ++++++++++++++++++++-------------------- 2 files changed, 68 insertions(+), 20 deletions(-) diff --git a/source/announce.md b/source/announce.md new file mode 100644 index 0000000..daf589e --- /dev/null +++ b/source/announce.md @@ -0,0 +1,48 @@ +--- +layout: default +title: Announcements 2020 +--- + +# Announcements 2020 +{:.no_toc} + +* Will be replaced with the ToC, excluding a header +{:toc} + +<p class="pull-right"> + Skip to: <a href="announce-2019.html">Announcements - 2019</a> +</p> + +#### 13 August 2020 - Security Advice: Announcing CVE-2019-0230 (Possible RCE) and CVE-2019-0233 (DoS) security issues {#a20200813} + +Two new [Struts Security Bulletins](https://cwiki.apache.org/confluence/display/WW/Security+Bulletin) have been issued for Struts 2 by the Apache Struts Security Team: + +* [S2-059](https://cwiki.apache.org/confluence/display/ww/s2-059) - Forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution (CVE-2019-0230) +* [S2-060](https://cwiki.apache.org/confluence/display/ww/s2-060) - Access permission override causing a Denial of Service when performing a file upload (CVE-2019-0233) + +Both issues affect Apache Struts in the version range 2.0.0 - 2.5.20. The current version 2.5.22, which was released in November 2019, is not affected. + +[CVE-2019-0230](https://cwiki.apache.org/confluence/display/ww/s2-059) has been reported by Matthias Kaiser, Apple Information Security. +By design, Struts 2 allows developers to utilize forced double evaluation for certain tag attributes. +When used with unvalidated, user modifiable input, malicious OGNL expressions may be injected. +In an ongoing effort, the Struts framework includes mitigations for limiting the impact of injected expressions, but Struts before 2.5.22 left an attack vector open which is addressed by this report. +**However, we continue to urge developers building upon Struts 2 to [not use `%{...}` syntax referencing unvalidated user modifiable input in tag attributes ](https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions), since this is the ultimate fix for this class of vulnerabilities.** + +[CVE-2019-0233](https://cwiki.apache.org/confluence/display/ww/s2-060) has been reported by Takeshi Terada of Mitsui Bussan Secure Directions, Inc. +In Struts before 2.5.22, when a file upload is performed to an Action that exposes the file with a getter, an attacker may manipulate the request such that the working copy of the uploaded file or even the container temporary upload directory may be set to read-only access. As a result, subsequent actions on the file or file uploads in general will fail with an error. + +Both issues are already fixed in Apache Struts [2.5.22](https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.22), which was released in November 2019. + +**We strongly recommend all users to [upgrade](download.cgi#struts-ga) to Struts 2.5.22, if this has not been done already.** + +The Apache Struts Security Team would like to thank the reporters for their efforts and their practice of responsible disclosure, as well as their help while investigating the report and coordinating public disclosure. + + +<p class="pull-right"> + Skip to: <a href="announce-2019.html">Announcements - 2019</a> +</p> + +<p class="pull-left"> + <strong>Next:</strong> + <a href="kickstart.html">Kickstart FAQ</a> +</p> diff --git a/source/index.html b/source/index.html index 8eb9c79..821aee3 100644 --- a/source/index.html +++ b/source/index.html @@ -31,23 +31,39 @@ title: Welcome to the Apache Struts project </p> </div> <div class="column col-md-4"> + <h2>Security Advice S2-058 released</h2> + <p> + A number of historic Struts Security Bulletins and related CVE database entries contained incorrect affected release version ranges. + Read more in + <a href="announce#a20200813">Announcement</a> + </p> + </div> + <div class="column col-md-4"> <h2>Apache Struts {{ site.current_version }} GA</h2> <p> Apache Struts {{ site.current_version }} GA has been released<br/>on {{ site.release_date }}. </p> - Read more in <a href="announce.html#a{{ site.release_date_short }}">Announcement</a> or in + Read more in <a href="announce-2019.html#a{{ site.release_date_short }}">Announcement</a> or in <a href="{{ site.wiki_url }}/Version+Notes+{{ site.current_version }}">Version notes</a> </div> + </div> + <div class="row"> + <div class="column col-md-4"> + <h2>Apache Struts 2.3.x EOL</h2> + <p> + The Apache Struts Team informs about discontinuing support for Struts 2.3.x branch, we recommend migration + to the latest version of Struts, read more in + <a href="announce-2019#a20190912">Announcement</a> + </p> + </div> <div class="column col-md-4"> <h2>Apache Struts {{ site.prev_version }} GA</h2> <p> It's the latest release of Struts 2.3.x which contains the latest security fixes, - released on {{ site.prev_release_date }}.<br/> Read more in <a href="announce.html#a{{ site.prev_release_date_short }}">Announcement</a> or in + released on {{ site.prev_release_date }}.<br/> Read more in <a href="announce-2019.html#a{{ site.prev_release_date_short }}">Announcement</a> or in <a href="{{ site.wiki_url }}/Version+Notes+{{ site.prev_version }}">Version notes</a> </p> </div> - </div> - <div class="row"> <div class="column col-md-4"> <h2>Immediately upgrade commons-fileupload to version 1.3.3</h2> <p> @@ -58,22 +74,6 @@ title: Welcome to the Apache Struts project </p> </div> <div class="column col-md-4"> - <h2>Apache Struts 2.3.x EOL</h2> - <p> - The Apache Struts Team informs about discontinuing support for Struts 2.3.x branch, we recommend migration - to the latest version of Struts, read more in - <a href="announce#a20190912">Announcement</a> - </p> - </div> - <div class="column col-md-4"> - <h2>Security Advice S2-058 released</h2> - <p> - A number of historic Struts Security Bulletins and related CVE database entries contained incorrect affected release version ranges. - Read more in - <a href="announce#a20190815">Announcement</a> - </p> - </div> - <div class="column col-md-4"> </div> </div> </div>