Red Hat Bugzilla – Bug 853825
CVE-2012-4386 struts2: CSRF protection bypass
Last modified: 2016-03-04 05:53:15 EST
Apache Struts2 includes CSRF protection based on an implementation of the synchronizer token pattern. It was found that this protection could be bypassed by an attacker changing the token name configuration parameter to match a session attribute known to the attacker. Struts 2.0.0 to Struts 2.3.4 is affected by this flaw. It is resolved in Struts 2.3.4.1. Upstream advisory: http://struts.apache.org/2.x/docs/s2-010.html
Statement: Not Vulnerable. This issue only affects struts 2, it does not affect the versions of struts as shipped with various Red Hat products.
References: https://issues.apache.org/jira/browse/WW-3858 http://www.securityfocus.com/bid/55346 http://secunia.com/advisories/50420 http://xforce.iss.net/xforce/xfdb/78182