Published:2006/04/26 Last Updated:2008/05/21
JVN#72225922
Apache Struts Validator allows to bypass input data validation
Overview
Apache Struts is a Web application framework from the Apache Software Foundation.
Apache Struts contains a vulnerability allowing to bypass input data validation by the Validator.
Products Affected
- Apache Struts 1.2.8 and earlier
Description
Impact
Depending on the web application, an attacker may be able to manipulate unexpected operations by bypassing validation of input data. For example, unintended format data may be saved.
Solution
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
RICOH COMPANY, LTD. | Not Vulnerable | 2006/05/10 | |
NEC Corporation | Vulnerable, investigating | 2006/08/31 |
Vendor | Link |
Apache Software Foundation |
http://struts.apache.org/1.2.9/userGuide/release-notes.html |
References
JPCERT/CC Addendum
Credit
Masato Anzai of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2006-1546 |
JVN iPedia |
JVNDB-2006-000615 |