[struts-site] branch master updated: Add ignores for VS Code and Eclipse

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/master by this push:
 new 4accab4  Add ignores for VS Code and Eclipse
4accab4 is described below

commit 4accab4a8528b6ea991b3da803431edd6ed447f2
Author: Rene Gielen 
AuthorDate: Thu Aug 13 09:59:23 2020 +0200

Add ignores for VS Code and Eclipse
---
 .gitignore | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/.gitignore b/.gitignore
index cca73da..1569020 100644
--- a/.gitignore
+++ b/.gitignore
@@ -6,3 +6,5 @@ target
 .bundle
 .jekyll-metadata
 _site
+.project
+.settings/



Buildbot success in on jekyll_websites

2020-08-13 Thread buildbot
The Buildbot has detected a passing build on builder jekyll_websites while 
building struts.
Full details are available at:
https://ci2.apache.org/#builders/7/builds/162

Buildbot URL: https://ci2.apache.org/

Worker for this Build: bb_slave10_ubuntu

Build Reason: Triggered jekyll auto-build via .asf.yaml by rgielen
Blamelist: asfinfra, commits@struts.apache.org

Build succeeded!

Sincerely,
 -The Buildbot



[struts-site] branch master updated: Adjust docker scripts and docs to remove start errors (bash) and allow local serving

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/master by this push:
 new 6ec8abe  Adjust docker scripts and docs to remove start errors (bash) 
and allow local serving
6ec8abe is described below

commit 6ec8abe20f37735ae38c9105f86458abb2abeece
Author: Rene Gielen 
AuthorDate: Thu Aug 13 12:08:14 2020 +0200

Adjust docker scripts and docs to remove start errors (bash) and allow 
local serving
---
 README.md   | 2 ++
 docker-run.fish | 2 +-
 docker-run.sh   | 4 ++--
 3 files changed, 5 insertions(+), 3 deletions(-)

diff --git a/README.md b/README.md
index 70cf0da..d9425c0 100644
--- a/README.md
+++ b/README.md
@@ -19,6 +19,8 @@ when running `fish-shell`, or:
 
 when running `Bash` or `Sh`.
 
+The continuously generated website can then be accessed at 
http://localhost:4000
+
 All pages are generated into the `content` folder.
 
 There are two scripts used to build the image but this should be used only 
when `Dockerfile` was modified.
diff --git a/docker-run.fish b/docker-run.fish
index f9fc341..94e0a88 100755
--- a/docker-run.fish
+++ b/docker-run.fish
@@ -1,3 +1,3 @@
 #!/usr/local/bin/fish
 
-docker run --rm -v $PWD:/srv/jekyll -it jekyll/jekyll:3.8 jekyll serve --watch 
--trace --force_polling --incremental
+docker run --rm -v $PWD:/srv/jekyll -it -p 4000:4000 jekyll/jekyll:3.8 jekyll 
serve --watch --trace --host 0.0.0.0 --force_polling --incremental
diff --git a/docker-run.sh b/docker-run.sh
index 70011ab..ff1efab 100755
--- a/docker-run.sh
+++ b/docker-run.sh
@@ -1,5 +1,5 @@
 #!/bin/sh
-export JEKYLL_VERSION 3.8
+export JEKYLL_VERSION=3.8
 
-docker run --rm -v $PWD:/srv/jekyll -it jekyll/jekyll:$JEKYLL_VERSION jekyll 
serve --watch --trace --host=0.0.0.0 --force_polling --incremental
+docker run --rm -v $PWD:/srv/jekyll -it -p 4000:4000 
jekyll/jekyll:$JEKYLL_VERSION jekyll serve --watch --trace --host 0.0.0.0 
--force_polling --incremental
 



Buildbot success in on jekyll_websites

2020-08-13 Thread buildbot
The Buildbot has detected a passing build on builder jekyll_websites while 
building struts.
Full details are available at:
https://ci2.apache.org/#builders/7/builds/163

Buildbot URL: https://ci2.apache.org/

Worker for this Build: bb_slave10_ubuntu

Build Reason: Triggered jekyll auto-build via .asf.yaml by rgielen
Blamelist: asfinfra, commits@struts.apache.org

Build succeeded!

Sincerely,
 -The Buildbot



[struts-site] 02/02: Add Announcement 2020-08-13

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch announcement-202008
in repository https://gitbox.apache.org/repos/asf/struts-site.git

commit 53faadb0de5f65a83e493fb0a6042f64f5d13f44
Author: Rene Gielen 
AuthorDate: Thu Aug 13 12:06:45 2020 +0200

Add Announcement 2020-08-13
---
 source/announce.md | 48 
 source/index.html  | 40 
 2 files changed, 68 insertions(+), 20 deletions(-)

diff --git a/source/announce.md b/source/announce.md
new file mode 100644
index 000..daf589e
--- /dev/null
+++ b/source/announce.md
@@ -0,0 +1,48 @@
+---
+layout: default
+title: Announcements 2020
+---
+
+# Announcements 2020
+{:.no_toc}
+
+* Will be replaced with the ToC, excluding a header
+{:toc}
+
+
+  Skip to: Announcements - 2019
+
+
+ 13 August 2020 - Security Advice: Announcing CVE-2019-0230 (Possible RCE) 
and CVE-2019-0233 (DoS) security issues {#a20200813}
+
+Two new [Struts Security 
Bulletins](https://cwiki.apache.org/confluence/display/WW/Security+Bulletin) 
have been issued for Struts 2 by the Apache Struts Security Team:
+
+* [S2-059](https://cwiki.apache.org/confluence/display/ww/s2-059) - Forced 
double OGNL evaluation, when evaluated on raw user input in tag attributes, may 
lead to remote code execution (CVE-2019-0230)
+* [S2-060](https://cwiki.apache.org/confluence/display/ww/s2-060) - Access 
permission override causing a Denial of Service when performing a file upload 
(CVE-2019-0233)
+
+Both issues affect Apache Struts in the version range 2.0.0 - 2.5.20. The 
current version 2.5.22, which was released in November 2019, is not affected.
+
+[CVE-2019-0230](https://cwiki.apache.org/confluence/display/ww/s2-059) has 
been reported by Matthias Kaiser, Apple Information Security.
+By design, Struts 2 allows developers to utilize forced double evaluation for 
certain tag attributes.
+When used with unvalidated, user modifiable input, malicious OGNL expressions 
may be injected.
+In an ongoing effort, the Struts framework includes mitigations for limiting 
the impact of injected expressions, but Struts before 2.5.22 left an attack 
vector open which is addressed by this report.
+**However, we continue to urge developers building upon Struts 2 to [not use 
`%{...}` syntax referencing unvalidated user modifiable input in tag attributes 
](https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions),
 since this is the ultimate fix for this class of vulnerabilities.**
+
+[CVE-2019-0233](https://cwiki.apache.org/confluence/display/ww/s2-060) has 
been reported by Takeshi Terada of Mitsui Bussan Secure Directions, Inc.
+In Struts before 2.5.22, when a file upload is performed to an Action that 
exposes the file with a getter, an attacker may manipulate the request such 
that the working copy of the uploaded file or even the container temporary 
upload directory may be set to read-only access. As a result, subsequent 
actions on the file or file uploads in general will fail with an error.
+
+Both issues are already fixed in Apache Struts 
[2.5.22](https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.22), 
which was released in November 2019.
+
+**We strongly recommend all users to [upgrade](download.cgi#struts-ga) to 
Struts 2.5.22, if this has not been done already.**
+
+The Apache Struts Security Team would like to thank the reporters for their 
efforts and their practice of responsible disclosure, as well as their help 
while investigating the report and coordinating public disclosure.
+
+
+
+  Skip to: Announcements - 2019
+
+
+
+  Next:
+  Kickstart FAQ
+
diff --git a/source/index.html b/source/index.html
index 8eb9c79..821aee3 100644
--- a/source/index.html
+++ b/source/index.html
@@ -31,23 +31,39 @@ title: Welcome to the Apache Struts project
 
   
   
+Security Advice S2-058 released
+
+A number of historic Struts Security Bulletins and related CVE 
database entries contained incorrect affected release version ranges.
+Read more in
+  Announcement
+
+  
+  
 Apache Struts {{ site.current_version }} GA
 
   Apache Struts {{ site.current_version }} GA has been releasedon 
{{ site.release_date }}.
 
-Read more in Announcement or in
+Read more in Announcement or in
 Version notes
   
+
+
+  
+Apache Struts 2.3.x EOL
+
+  The Apache Struts Team informs about discontinuing support for 
Struts 2.3.x branch, we recommend migration
+  to the latest version of Struts, read more in
+  Announcement
+
+  
   
 Apache Struts {{ site.prev_version }} GA
 
   It's the latest release of Struts 2.3.x which contains the latest 
security fixes,
-  released on {{ site.prev_release_date }}. Read more in Announc

[struts-site] branch announcement-202008 created (now 53faadb)

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a change to branch announcement-202008
in repository https://gitbox.apache.org/repos/asf/struts-site.git.


  at 53faadb  Add Announcement 2020-08-13

This branch includes the following new commits:

 new 5059bd1  Make current 2019 announcement page archived
 new 53faadb  Add Announcement 2020-08-13

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




[struts-site] 01/02: Make current 2019 announcement page archived

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch announcement-202008
in repository https://gitbox.apache.org/repos/asf/struts-site.git

commit 5059bd1986eae537a20ab921253a8f9286d49af5
Author: Rene Gielen 
AuthorDate: Thu Aug 13 10:04:02 2020 +0200

Make current 2019 announcement page archived
---
 source/{announce.md => announce-2019.md} | 0
 1 file changed, 0 insertions(+), 0 deletions(-)

diff --git a/source/announce.md b/source/announce-2019.md
similarity index 100%
rename from source/announce.md
rename to source/announce-2019.md



[struts-site] 01/02: Make current 2019 announcement page archived

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/struts-site.git

commit 82f2b508346124b3907f399cca8ff5f678f4aa9d
Author: Rene Gielen 
AuthorDate: Thu Aug 13 10:04:02 2020 +0200

Make current 2019 announcement page archived
---
 source/{announce.md => announce-2019.md} | 0
 1 file changed, 0 insertions(+), 0 deletions(-)

diff --git a/source/announce.md b/source/announce-2019.md
similarity index 100%
rename from source/announce.md
rename to source/announce-2019.md



[struts-site] 02/02: Add Announcement 2020-08-13

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/struts-site.git

commit 166f72eb8ea5fbf0ab6b57483f46630235c0a6a5
Author: Rene Gielen 
AuthorDate: Thu Aug 13 12:06:45 2020 +0200

Add Announcement 2020-08-13
---
 source/announce.md | 48 
 source/index.html  | 40 
 2 files changed, 68 insertions(+), 20 deletions(-)

diff --git a/source/announce.md b/source/announce.md
new file mode 100644
index 000..daf589e
--- /dev/null
+++ b/source/announce.md
@@ -0,0 +1,48 @@
+---
+layout: default
+title: Announcements 2020
+---
+
+# Announcements 2020
+{:.no_toc}
+
+* Will be replaced with the ToC, excluding a header
+{:toc}
+
+
+  Skip to: Announcements - 2019
+
+
+ 13 August 2020 - Security Advice: Announcing CVE-2019-0230 (Possible RCE) 
and CVE-2019-0233 (DoS) security issues {#a20200813}
+
+Two new [Struts Security 
Bulletins](https://cwiki.apache.org/confluence/display/WW/Security+Bulletin) 
have been issued for Struts 2 by the Apache Struts Security Team:
+
+* [S2-059](https://cwiki.apache.org/confluence/display/ww/s2-059) - Forced 
double OGNL evaluation, when evaluated on raw user input in tag attributes, may 
lead to remote code execution (CVE-2019-0230)
+* [S2-060](https://cwiki.apache.org/confluence/display/ww/s2-060) - Access 
permission override causing a Denial of Service when performing a file upload 
(CVE-2019-0233)
+
+Both issues affect Apache Struts in the version range 2.0.0 - 2.5.20. The 
current version 2.5.22, which was released in November 2019, is not affected.
+
+[CVE-2019-0230](https://cwiki.apache.org/confluence/display/ww/s2-059) has 
been reported by Matthias Kaiser, Apple Information Security.
+By design, Struts 2 allows developers to utilize forced double evaluation for 
certain tag attributes.
+When used with unvalidated, user modifiable input, malicious OGNL expressions 
may be injected.
+In an ongoing effort, the Struts framework includes mitigations for limiting 
the impact of injected expressions, but Struts before 2.5.22 left an attack 
vector open which is addressed by this report.
+**However, we continue to urge developers building upon Struts 2 to [not use 
`%{...}` syntax referencing unvalidated user modifiable input in tag attributes 
](https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions),
 since this is the ultimate fix for this class of vulnerabilities.**
+
+[CVE-2019-0233](https://cwiki.apache.org/confluence/display/ww/s2-060) has 
been reported by Takeshi Terada of Mitsui Bussan Secure Directions, Inc.
+In Struts before 2.5.22, when a file upload is performed to an Action that 
exposes the file with a getter, an attacker may manipulate the request such 
that the working copy of the uploaded file or even the container temporary 
upload directory may be set to read-only access. As a result, subsequent 
actions on the file or file uploads in general will fail with an error.
+
+Both issues are already fixed in Apache Struts 
[2.5.22](https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.5.22), 
which was released in November 2019.
+
+**We strongly recommend all users to [upgrade](download.cgi#struts-ga) to 
Struts 2.5.22, if this has not been done already.**
+
+The Apache Struts Security Team would like to thank the reporters for their 
efforts and their practice of responsible disclosure, as well as their help 
while investigating the report and coordinating public disclosure.
+
+
+
+  Skip to: Announcements - 2019
+
+
+
+  Next:
+  Kickstart FAQ
+
diff --git a/source/index.html b/source/index.html
index 8eb9c79..821aee3 100644
--- a/source/index.html
+++ b/source/index.html
@@ -31,23 +31,39 @@ title: Welcome to the Apache Struts project
 
   
   
+Security Advice S2-058 released
+
+A number of historic Struts Security Bulletins and related CVE 
database entries contained incorrect affected release version ranges.
+Read more in
+  Announcement
+
+  
+  
 Apache Struts {{ site.current_version }} GA
 
   Apache Struts {{ site.current_version }} GA has been releasedon 
{{ site.release_date }}.
 
-Read more in Announcement or in
+Read more in Announcement or in
 Version notes
   
+
+
+  
+Apache Struts 2.3.x EOL
+
+  The Apache Struts Team informs about discontinuing support for 
Struts 2.3.x branch, we recommend migration
+  to the latest version of Struts, read more in
+  Announcement
+
+  
   
 Apache Struts {{ site.prev_version }} GA
 
   It's the latest release of Struts 2.3.x which contains the latest 
security fixes,
-  released on {{ site.prev_release_date }}. Read more in Announcement or in
+

[struts-site] branch master updated (6ec8abe -> 166f72e)

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/struts-site.git.


from 6ec8abe  Adjust docker scripts and docs to remove start errors (bash) 
and allow local serving
 new 82f2b50  Make current 2019 announcement page archived
 new 166f72e  Add Announcement 2020-08-13

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 source/{announce.md => announce-2019.md} |   0
 source/announce.md   | 155 ---
 source/index.html|  40 
 3 files changed, 38 insertions(+), 157 deletions(-)
 copy source/{announce.md => announce-2019.md} (100%)



[struts-site] branch asf-site updated: Automatic Site Publish by Buildbot

2020-08-13 Thread git-site-role
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
 new 9084f62  Automatic Site Publish by Buildbot
9084f62 is described below

commit 9084f6260f88a20fd9c77a5df14cc5bd9e96e828
Author: buildbot 
AuthorDate: Thu Aug 13 10:13:09 2020 +

Automatic Site Publish by Buildbot
---
 output/{announce.html => announce-2019.html} |   2 +-
 output/announce.html | 168 +++
 output/index.html|  40 +++
 3 files changed, 40 insertions(+), 170 deletions(-)

diff --git a/output/announce.html b/output/announce-2019.html
similarity index 99%
copy from output/announce.html
copy to output/announce-2019.html
index 2a620cd..9ec6e55 100644
--- a/output/announce.html
+++ b/output/announce-2019.html
@@ -126,7 +126,7 @@
 
 
   
-https://github.com/apache/struts-site/edit/master/source/announce.md"; 
title="Edit this page on GitHub">Edit on GitHub
+https://github.com/apache/struts-site/edit/master/source/announce-2019.md";
 title="Edit this page on GitHub">Edit on GitHub
 
 Announcements 2019
 
diff --git a/output/announce.html b/output/announce.html
index 2a620cd..3191dd8 100644
--- a/output/announce.html
+++ b/output/announce.html
@@ -7,7 +7,7 @@
   
   
 
-  Announcements 2019
+  Announcements 2020
 
   
   
@@ -128,174 +128,44 @@
   
 https://github.com/apache/struts-site/edit/master/source/announce.md"; 
title="Edit this page on GitHub">Edit on GitHub
 
-Announcements 2019
+Announcements 2020
 
 
-  29 November 2019 - 
Struts 2.5.22 General Availability
-  12 September 2019 - 
Struts 2.3.x reached End-Of-Life
-  15 August 2019 - 
Security Advice: Announcing corrected affected version ranges in historic 
Apache Struts security bulletins and CVE entries
-  14 January 2019 - 
Struts 2.5.20 General Availability
-  30 December 2018 - 
Struts 2.3.37 General Availability
+  13 August 2020 - 
Security Advice: Announcing CVE-2019-0230 (Possible RCE) and CVE-2019-0233 
(DoS) security issues
 
 
 
-  Skip to: Announcements - 2018
+  Skip to: Announcements - 2019
 
 
-29 November 2019 - Struts 2.5.22 General Availability
+13 August 2020 - Security Advice: Announcing CVE-2019-0230 
(Possible RCE) and CVE-2019-0233 (DoS) security issues
 
-The Apache Struts group is pleased to announce that Struts 2.5.22 is 
available as a “General Availability”
-release. The GA designation is our highest quality grade.
-
-Apache Struts 2 is an elegant, extensible framework for creating 
enterprise-ready Java web applications.
-The framework is designed to streamline the full development cycle, from 
building, to deploying,
-to maintaining applications over time.
-
-
-  Please be aware of new security enhancements added to the version of 
Struts, they are disabled by default 
-but please consider enabling them to increase safety of you application. You 
will find more details in our 
-Security Guide.
-
-
-Below is a full list of all changes:
+Two new https://cwiki.apache.org/confluence/display/WW/Security+Bulletin";>Struts 
Security Bulletins have been issued for Struts 2 by the Apache Struts 
Security Team:
 
 
-  File upload fails from certain clients
-  Not existing property in listValueKey throws exception
-  Can’t get OgnlValueStack log even if enable logMissingProperties
-  No more calling of a static variable in Struts 2.8.20 available
-  NullPointerException in ProxyUtil class when accessing static member
-  EmptyStackException in JSON plugin due to concurrency
-  Tiles bug when parsing file:// URLs including # as part of the URL
-  Accessing static variable via OGNL returns nothing
-  HttpParameters.Builder can wrap objects in two layers of Parameters
-  Binding Integer Array upon form submission
-  Double-submit of TokenSessionStoreInterceptor broken since 2.5.16
-  xerces tries to load resources from the internet
-  Dispatcher prints stacktraces directly to the console
-  The content allowed-methods tag of the XML configuration is sometimes 
truncated
-  OGNL: An illegal reflective access operation has occurred
-  java.lang.reflect.InvocationTargetException - Class: 
com.opensymphony.xwork2.inject.ContainerImpl$ConstructorInjector
-  Struts2 convention plugin lacks Java 11 support
-  Upgrade SLF4J to latest 1.7.x version
-  Minor enhancement/fix to AbstractLocalizedTextProvider
-  Provide mechanism to clear OgnlUtil caches
-  Struts 2 unit testing using StrutTestCase class
-  Upgrade Jackson library to the latest version
-  Upgrade to OGNL version 3.1.22
-  Update a few Struts 2.5.x libraries to more recent versions
-  Upgrade commons-beanutils to version 1.9.4
-  Upgrade jackson-databind to version 2.9.9.3
-  Upgrade to OGNL 3.1.26 and adapt to its new features
+  https://cwiki.apache.org/confluence/display/ww/s2-059";>S2-059 

Buildbot success in on jekyll_websites

2020-08-13 Thread buildbot
The Buildbot has detected a passing build on builder jekyll_websites while 
building struts.
Full details are available at:
https://ci2.apache.org/#builders/7/builds/164

Buildbot URL: https://ci2.apache.org/

Worker for this Build: bb_slave10_ubuntu

Build Reason: Triggered jekyll auto-build via .asf.yaml by rgielen
Blamelist: asfinfra, commits@struts.apache.org

Build succeeded!

Sincerely,
 -The Buildbot



Buildbot success in on jekyll_websites

2020-08-13 Thread buildbot
The Buildbot has detected a passing build on builder jekyll_websites while 
building struts.
Full details are available at:
https://ci2.apache.org/#builders/7/builds/165

Buildbot URL: https://ci2.apache.org/

Worker for this Build: bb_slave10_ubuntu

Build Reason: Triggered jekyll auto-build via .asf.yaml by rgielen
Blamelist: asfinfra, commits@struts.apache.org

Build succeeded!

Sincerely,
 -The Buildbot



[struts-site] branch master updated: Add $-syntax to announcement

2020-08-13 Thread rgielen
This is an automated email from the ASF dual-hosted git repository.

rgielen pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/master by this push:
 new d7a07ec  Add $-syntax to announcement
d7a07ec is described below

commit d7a07ec8bf0da37593f106e7633e64298747d679
Author: Rene Gielen 
AuthorDate: Thu Aug 13 12:44:54 2020 +0200

Add $-syntax to announcement
---
 source/announce.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/source/announce.md b/source/announce.md
index daf589e..a6a543c 100644
--- a/source/announce.md
+++ b/source/announce.md
@@ -26,7 +26,7 @@ Both issues affect Apache Struts in the version range 2.0.0 - 
2.5.20. The curren
 By design, Struts 2 allows developers to utilize forced double evaluation for 
certain tag attributes.
 When used with unvalidated, user modifiable input, malicious OGNL expressions 
may be injected.
 In an ongoing effort, the Struts framework includes mitigations for limiting 
the impact of injected expressions, but Struts before 2.5.22 left an attack 
vector open which is addressed by this report.
-**However, we continue to urge developers building upon Struts 2 to [not use 
`%{...}` syntax referencing unvalidated user modifiable input in tag attributes 
](https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions),
 since this is the ultimate fix for this class of vulnerabilities.**
+**However, we continue to urge developers building upon Struts 2 to [not use 
`%{...}` or `${...}` syntax referencing unvalidated user modifiable input in 
tag attributes 
](https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions),
 since this is the ultimate fix for this class of vulnerabilities.**
 
 [CVE-2019-0233](https://cwiki.apache.org/confluence/display/ww/s2-060) has 
been reported by Takeshi Terada of Mitsui Bussan Secure Directions, Inc.
 In Struts before 2.5.22, when a file upload is performed to an Action that 
exposes the file with a getter, an attacker may manipulate the request such 
that the working copy of the uploaded file or even the container temporary 
upload directory may be set to read-only access. As a result, subsequent 
actions on the file or file uploads in general will fail with an error.



[struts-site] branch asf-site updated: Automatic Site Publish by Buildbot

2020-08-13 Thread git-site-role
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
 new f474025  Automatic Site Publish by Buildbot
f474025 is described below

commit f474025c4a392248388402acad005076ec244d07
Author: buildbot 
AuthorDate: Thu Aug 13 10:45:53 2020 +

Automatic Site Publish by Buildbot
---
 output/announce.html | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/output/announce.html b/output/announce.html
index 3191dd8..1444b0e 100644
--- a/output/announce.html
+++ b/output/announce.html
@@ -153,7 +153,7 @@
 By design, Struts 2 allows developers to utilize forced double evaluation for 
certain tag attributes.
 When used with unvalidated, user modifiable input, malicious OGNL expressions 
may be injected.
 In an ongoing effort, the Struts framework includes mitigations for limiting 
the impact of injected expressions, but Struts before 2.5.22 left an attack 
vector open which is addressed by this report.
-However, we continue to urge developers building upon Struts 2 to https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions";>not
 use %{...} syntax referencing 
unvalidated user modifiable input in tag attributes , since this is the 
ultimate fix for this class of vulnerabilities.
+However, we continue to urge developers building upon Struts 2 to https://struts.apache.org/security/#use-struts-tags-instead-of-raw-el-expressions";>not
 use %{...} or ${...} syntax referencing unvalidated user 
modifiable input in tag attributes , since this is the ultimate fix for 
this class of vulnerabilities.
 
 https://cwiki.apache.org/confluence/display/ww/s2-060";>CVE-2019-0233 
has been reported by Takeshi Terada of Mitsui Bussan Secure Directions, Inc.
 In Struts before 2.5.22, when a file upload is performed to an Action that 
exposes the file with a getter, an attacker may manipulate the request such 
that the working copy of the uploaded file or even the container temporary 
upload directory may be set to read-only access. As a result, subsequent 
actions on the file or file uploads in general will fail with an error.