The Apache Struts 2.3.1.2 Released & Closes Remote Command Execution Vulnerability
The Apache Struts group today officially declared that Struts 2.3.1.2 is available as a "General Availability" release. This closes a critical hole in versions of Struts from 2.0.0 to 2.3.1.1 that allowed for remote command execution. The vulnerability makes it possible for the protection around OGNL, an expression language used for getting and setting properties of Java objects, to be bypassed and arbitrary expressions be evaluated.
Brief About Apache Struts :-
Apache Struts 2 is an elegant, extensible framework for creating enterprise-ready Java web applications. The framework is designed to streamline the full development cycle, from building, to deploying, to maintaining applications over time.
This release includes some important security fix:
- ParameterInterceptor vulnerability allowed remote command execution
To Download The Apache Struts 2.3.1.2 Click Here
LINK TO OUR HOME PAGE :


Categories:
download
,
security-news
,
vulnerablity