This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-site in repository https://gitbox.apache.org/repos/asf/struts-site.git
The following commit(s) were added to refs/heads/asf-site by this push: new f9eff74 Automatic Site Publish by Buildbot f9eff74 is described below commit f9eff74d820f26115e541658f8eb99e64ad9a9ef Author: buildbot <us...@infra.apache.org> AuthorDate: Tue Dec 8 07:02:45 2020 +0000 Automatic Site Publish by Buildbot --- output/announce.html | 27 +++++++++++++++++++++++++++ output/index.html | 6 +++--- 2 files changed, 30 insertions(+), 3 deletions(-) diff --git a/output/announce.html b/output/announce.html index ec1c806..9dcb38d 100644 --- a/output/announce.html +++ b/output/announce.html @@ -132,6 +132,7 @@ <h1 class="no_toc" id="announcements-2020">Announcements 2020</h1> <ul id="markdown-toc"> + <li><a href="#a20201208" id="markdown-toc-a20201208">08 December 2020 - Potential RCE when using forced evaluation - CVE-2020-17530</a></li> <li><a href="#a20201206" id="markdown-toc-a20201206">06 December 2020 - Struts 2.5.26 General Availability</a></li> <li><a href="#a20200928" id="markdown-toc-a20200928">28 September 2020 - Struts 2.5.25 General Availability</a></li> <li><a href="#a20200813" id="markdown-toc-a20200813">13 August 2020 - Security Advice: Announcing CVE-2019-0230 (Possible RCE) and CVE-2019-0233 (DoS) security issues</a></li> @@ -141,6 +142,32 @@ Skip to: <a href="announce-2019.html">Announcements - 2019</a> </p> +<h4 id="a20201208">08 December 2020 - Potential RCE when using forced evaluation - CVE-2020-17530</h4> + +<p>The Apache Struts Security team would like to announce that forced OGNL evaluation, when evaluated on raw user input +in tag attributes, may lead to remote code execution.</p> + +<p><strong>Problem</strong></p> + +<p>Some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation +by using the <code class="highlighter-rouge">%{...}</code> syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution +and security degradation.</p> + +<p><strong>Solution</strong></p> + +<p>Avoid using forced OGNL evaluation on untrusted user input, and/or upgrade to Struts 2.5.26 which checks if expression +evaluation won’t lead to the double evaluation.</p> + +<p>Please read our Security Bulletin <a href="https://cwiki.apache.org/confluence/display/WW/S2-061">S2-061</a> for more details.</p> + +<p>This vulnerability was identified by:</p> +<ul> + <li>Alvaro Munoz - pwntester at github dot com</li> + <li>Masato Anzai of Aeye Security Lab, inc.</li> +</ul> + +<p><strong>All developers are strongly advised to perform this action.</strong></p> + <h4 id="a20201206">06 December 2020 - Struts 2.5.26 General Availability</h4> <p>The Apache Struts group is pleased to announce that Struts 2.5.26 is available as a “General Availability” diff --git a/output/index.html b/output/index.html index b29b065..2d5adae 100644 --- a/output/index.html +++ b/output/index.html @@ -153,11 +153,11 @@ <a href="https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.26">Version notes</a> </div> <div class="column col-md-4"> - <h2>Security Advice S2-058 released</h2> + <h2>Security Advice S2-061 released</h2> <p> - A number of historic Struts Security Bulletins and related CVE database entries contained incorrect affected release version ranges. + Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Read more in - <a href="announce#a20200813">Announcement</a> + <a href="announce#a20201208">Announcement</a> </p> </div> <div class="column col-md-4">