Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 773150 - (CVE-2011-5057) CVE-2011-5057 struts: improper access restrictions to collections such as session and request
CVE-2011-5057 struts: improper access restrictions to collections such as ses...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20111221,repor...
: Security
Depends On:
Blocks: 773173
  Show dependency treegraph
 
Reported: 2012-01-11 00:24 EST by Vincent Danen
Modified: 2012-01-12 23:10 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-01-12 23:08:44 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2012-01-11 00:24:53 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-5057 to
the following vulnerability:

Name: CVE-2011-5057
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5057
Assigned: 20120108
Reference: http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html
Reference: https://issues.apache.org/jira/browse/WW-2264
Reference: https://issues.apache.org/jira/browse/WW-3631
Reference: http://secunia.com/advisories/47109

Apache Struts 2.3.1.1 and earlier provides interfaces that do not
properly restrict access to collections such as the session and
request collections, which might allow remote attackers to modify
run-time data values via a crafted parameter to an application that
implements an affected interface, as demonstrated by the SessionAware,
RequestAware, ApplicationAware, ServletRequestAware,
ServletResponseAware, and ParameterAware interfaces.  NOTE: the vendor
disputes the significance of this report because of an "easy
work-around in existing apps by configuring the interceptor."
Comment 1 David Jorm 2012-01-12 23:08:29 EST
This issue only affects struts 2.
Comment 2 David Jorm 2012-01-12 23:08:44 EST
Statement:

Not Vulnerable. This issue does not affect the versions of struts as shipped with various Red Hat products.

Note You need to log in before you can comment on or make changes to this bug.