This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new f9eff74  Automatic Site Publish by Buildbot
f9eff74 is described below

commit f9eff74d820f26115e541658f8eb99e64ad9a9ef
Author: buildbot <us...@infra.apache.org>
AuthorDate: Tue Dec 8 07:02:45 2020 +0000

    Automatic Site Publish by Buildbot
---
 output/announce.html | 27 +++++++++++++++++++++++++++
 output/index.html    |  6 +++---
 2 files changed, 30 insertions(+), 3 deletions(-)

diff --git a/output/announce.html b/output/announce.html
index ec1c806..9dcb38d 100644
--- a/output/announce.html
+++ b/output/announce.html
@@ -132,6 +132,7 @@
     <h1 class="no_toc" id="announcements-2020">Announcements 2020</h1>
 
 <ul id="markdown-toc">
+  <li><a href="#a20201208" id="markdown-toc-a20201208">08 December 2020 - 
Potential RCE when using forced evaluation - CVE-2020-17530</a></li>
   <li><a href="#a20201206" id="markdown-toc-a20201206">06 December 2020 - 
Struts 2.5.26 General Availability</a></li>
   <li><a href="#a20200928" id="markdown-toc-a20200928">28 September 2020 - 
Struts 2.5.25 General Availability</a></li>
   <li><a href="#a20200813" id="markdown-toc-a20200813">13 August 2020 - 
Security Advice: Announcing CVE-2019-0230 (Possible RCE) and CVE-2019-0233 
(DoS) security issues</a></li>
@@ -141,6 +142,32 @@
   Skip to: <a href="announce-2019.html">Announcements - 2019</a>
 </p>
 
+<h4 id="a20201208">08 December 2020 - Potential RCE when using forced 
evaluation - CVE-2020-17530</h4>
+
+<p>The Apache Struts Security team would like to announce that forced OGNL 
evaluation, when evaluated on raw user input 
+in tag attributes, may lead to remote code execution.</p>
+
+<p><strong>Problem</strong></p>
+
+<p>Some of the tag’s attributes could perform a double evaluation if a 
developer applied forced OGNL evaluation 
+by using the <code class="highlighter-rouge">%{...}</code> syntax. Using 
forced OGNL evaluation on untrusted user input can lead to a Remote Code 
Execution 
+and security degradation.</p>
+
+<p><strong>Solution</strong></p>
+
+<p>Avoid using forced OGNL evaluation on untrusted user input, and/or upgrade 
to Struts 2.5.26 which checks if expression 
+evaluation won’t lead to the double evaluation.</p>
+
+<p>Please read our Security Bulletin <a 
href="https://cwiki.apache.org/confluence/display/WW/S2-061";>S2-061</a> for 
more details.</p>
+
+<p>This vulnerability was identified by:</p>
+<ul>
+  <li>Alvaro Munoz - pwntester at github dot com</li>
+  <li>Masato Anzai of Aeye Security Lab, inc.</li>
+</ul>
+
+<p><strong>All developers are strongly advised to perform this 
action.</strong></p>
+
 <h4 id="a20201206">06 December 2020 - Struts 2.5.26 General Availability</h4>
 
 <p>The Apache Struts group is pleased to announce that Struts 2.5.26 is 
available as a “General Availability”
diff --git a/output/index.html b/output/index.html
index b29b065..2d5adae 100644
--- a/output/index.html
+++ b/output/index.html
@@ -153,11 +153,11 @@
         <a 
href="https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.26";>Version
 notes</a>
       </div>
       <div class="column col-md-4">
-        <h2>Security Advice S2-058 released</h2>
+        <h2>Security Advice S2-061 released</h2>
         <p>
-          A number of historic Struts Security Bulletins and related CVE 
database entries contained incorrect affected release version ranges.
+          Forced OGNL evaluation, when evaluated on raw user input in tag 
attributes, may lead to remote code execution.
           Read more in
-          <a href="announce#a20200813">Announcement</a>
+          <a href="announce#a20201208">Announcement</a>
         </p>
       </div>
       <div class="column col-md-4">

Reply via email to