|Home > Security Bulletins > S2-042|
Who should read this
All Struts 2 developers and users
Impact of vulnerability
Possible path traversal in the Convention plugin in Struts 2.3.20 - 2.3.30
Maximum security rating
Upgrade to Struts 2.3.31 or to any version of Struts 2.5
Struts 2.3.20 - Struts 2.3.31
Takeshi Terada of Mitsui Bussan Secure Directions, Inc.
It is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
Upgrade to Apache Struts version 2.3.31 when you are using Struts 2.3.20 - 2.3.30 with the Convention plugin.
No backward incompatibility issues are expected.
There is no known workaround for this vulnerability, please upgrade to the mentioned Struts versions.