Description
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0486 | The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. |
Github GHSA |
GHSA-38cr-2ph5-frr9 | Apache Struts REST Plugin can potentially allow a DoS attack |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T23:11:07.229Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1327
No data.
Status : Modified
Published: 2018-03-27T21:29:00.970
Modified: 2024-11-21T03:59:38.023
Link: CVE-2018-1327
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA