Check Point Reference: | CPAI-2012-217 |
Date Published: | 14 May 2012 |
Severity: | Critical |
Last Updated: | Monday 25 November, 2024 |
Source: | CVE-2011-3923 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Apache Software Foundation Struts 2 prior to 2.3.1.2 |
Vulnerability Description | A command execution vulnerability has been reported in Apache Struts 2. |
Vulnerability Details | The vulnerability is due to insufficient input validation in the ParametersInterceptor component when parsing specially crafted HTTP requests. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to a target system. Successful exploitation would allow an attacker to execute arbitrary OGNL expressions in the security context of the web application server. |
This protection will detect and block malicious HTPP requests.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Apache Server Protection Violation
Attack Information: Apache Struts 2 ParametersInterceptor OGNL Command Execution