Bug 1091938 (CVE-2014-0114) - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters
Summary: CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0114
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1092452 1092453 1092454 1092455 1092456 1092457 1092458
Blocks: 1091768 1092459 1092461 1093611 1093886 1585921
TreeView+ depends on / blocked
 
Reported: 2014-04-28 11:01 UTC by Arun Babu Neelicattu
Modified: 2021-10-07 10:39 UTC (History)
31 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-05-16 13:17:00 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0474 0 normal SHIPPED_LIVE Important: struts security update 2014-05-07 08:56:26 UTC
Red Hat Product Errata RHSA-2014:0497 0 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse 6.1.0 security update 2014-05-14 22:06:57 UTC
Red Hat Product Errata RHSA-2014:0498 0 normal SHIPPED_LIVE Important: Fuse ESB Enterprise 7.1.0 security update 2014-05-14 22:06:52 UTC
Red Hat Product Errata RHSA-2014:0500 0 normal SHIPPED_LIVE Important: struts security update 2014-06-12 10:13:39 UTC
Red Hat Product Errata RHSA-2014:0511 0 normal SHIPPED_LIVE Important: Red Hat JBoss Operations Network 3.2.1 security update 2014-05-15 21:18:12 UTC
Red Hat Product Errata RHSA-2018:2669 0 None None None 2018-09-11 07:54:05 UTC
Red Hat Product Errata RHSA-2019:2995 0 None None None 2019-10-10 07:20:22 UTC

Description Arun Babu Neelicattu 2014-04-28 11:01:53 UTC
It was found that the Struts 1 ActionForm object allowed access to the 'class' parameter, which is directly mapped to the getClass() method. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. This could lead to remote code execution under certain conditions.

The root cause of this issue is the fact that commons-beanutils exposes the class property by default, with no mechanism to disable access to it. If a framework built on commons-beanutils does not otherwise suppress access to the class property, then a remote attacker could use this flaw to manipulate the ClassLoader used by the underlying container. This could lead to remote code execution under certain conditions. commons-beanutils 1.9.2 has now shipped, including a specialized BeanIntrospector implementation that allows suppressing properties. Frameworks built on commons-beantutils can make use of the new pre-configured SuppressPropertiesBeanIntrospector to address this flaw.

Comment 10 Arun Babu Neelicattu 2014-04-29 11:14:56 UTC
Created struts tracking bugs for this issue:

Affects: fedora-all [bug 1092452]

Comment 20 David Jorm 2014-05-02 07:06:29 UTC
Statement:

This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. The impact of this depends on which ClassLoader properties are exposed. Exploits that lead to remote code execution have been published. These exploits rely on ClassLoader properties that are exposed on Tomcat 8, which is not included in any supported Red Hat products. However, some Red Hat products that ship Struts 1 do expose ClassLoader properties that could potentially be exploited. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/869353

Comment 31 errata-xmlrpc 2014-05-07 04:58:42 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:0474 https://rhn.redhat.com/errata/RHSA-2014-0474.html

Comment 32 errata-xmlrpc 2014-05-14 18:07:05 UTC
This issue has been addressed in following products:

  Fuse ESB Enterprise 7.1.0 R1 P4

Via RHSA-2014:0498 https://rhn.redhat.com/errata/RHSA-2014-0498.html

Comment 33 errata-xmlrpc 2014-05-14 18:07:10 UTC
This issue has been addressed in following products:

  Red Hat JBoss Fuse 6.1.0 Patch 1

Via RHSA-2014:0497 https://rhn.redhat.com/errata/RHSA-2014-0497.html

Comment 34 errata-xmlrpc 2014-05-14 19:07:54 UTC
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.4
  Red Hat Network Satellite Server v 5.5
  Red Hat Satellite Server v 5.6

Via RHSA-2014:0500 https://rhn.redhat.com/errata/RHSA-2014-0500.html

Comment 35 errata-xmlrpc 2014-05-15 17:18:39 UTC
This issue has been addressed in following products:

  Red Hat JBoss Operations Network 3.2.1

Via RHSA-2014:0511 https://rhn.redhat.com/errata/RHSA-2014-0511.html

Comment 36 Fedora Update System 2014-08-23 02:00:34 UTC
struts-1.3.10-10.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 39 errata-xmlrpc 2018-09-11 07:53:53 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Fuse

Via RHSA-2018:2669 https://access.redhat.com/errata/RHSA-2018:2669

Comment 41 errata-xmlrpc 2019-10-10 07:20:20 UTC
This issue has been addressed in the following products:

  Red Hat JBoss AMQ

Via RHSA-2019:2995 https://access.redhat.com/errata/RHSA-2019:2995

Comment 47 Tomas Hoger 2020-01-03 22:51:50 UTC
(In reply to Arun Babu Neelicattu from comment #37)
> Upstream Fix:
> 
> (proposed for struts 1.3.x) https://github.com/apache/struts1/pull/1

This fix has never been applied upstream.  Instead, the following fix was applied:

http://svn.apache.org/viewvc?view=revision&revision=1603883

This change depends on commons-beanutils 1.9.2, which introduced SuppressPropertiesBeanIntrospector class that can be used to block the use of specified bean properties.  Relevant commons-beanutils upstream links:

https://commons.apache.org/proper/commons-beanutils/changes-report.html#a1.9.2
https://issues.apache.org/jira/browse/BEANUTILS-463
https://gitbox.apache.org/repos/asf?p=commons-beanutils.git;a=commitdiff;h=4e410e068b8d367c53766a7da712b1b6f3fd8101
https://gitbox.apache.org/repos/asf?p=commons-beanutils.git;a=commitdiff;h=2412c90ba5584fed123fa6a33e752e6c8eaf74e9
https://gitbox.apache.org/repos/asf?p=commons-beanutils.git;a=commitdiff;h=f3bdbbcfb853d81941f3cec84e5108779ab8d269
https://gitbox.apache.org/repos/asf?p=commons-beanutils.git;a=commitdiff;h=f3bdbbcfb853d81941f3cec84e5108779ab8d269

Note that commons-beanutils 1.9.2 does not fix the CVE-2014-0114 issue by itself.  It only adds functionality that can be used by applications to easily block the use of getClass() method to access class property, but it still requires any affected application to be modified as the protection is not enabled by default.  That was a deliberate upstream decision to not prevent the use of getClass() by default.

However, that upstream decision was changed in commons-beanutils version 1.9.4 that started to block access to the class property by default:

https://commons.apache.org/proper/commons-beanutils/changes-report.html#a1.9.4
https://issues.apache.org/jira/browse/BEANUTILS-520
https://gitbox.apache.org/repos/asf?p=commons-beanutils.git;a=commitdiff;h=62e82ad92cf4818709d6044aaf257b73d42659a4
https://gitbox.apache.org/repos/asf?p=commons-beanutils.git;a=commitdiff;h=3f7f276dd720b7b95ed59387d9ac4561b2acc20b

This additional change got a separate CVE-2019-10086, see bug 1767483.


Note You need to log in before you can comment on or make changes to this bug.