[<prev] [next>] [day] [month] [year] [list]
Message-Id: <A348DAE4-9556-4BF4-A455-9C2766846C9A@apache.org>
Date: Sat, 14 Jun 2014 00:57:45 +1000
From: Brett Porter <brett@...che.org>
To: announce@...che.org
Cc: "security@...che.org Team" <security@...che.org>,
full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
users@...tinuum.apache.org
Subject: [SECURITY] CVE-2013-2251: Apache Continuum affected by Remote Command Execution
CVE-2013-2251: Apache Continuum affected by Remote Command Execution
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
- Continuum 1.3.1 to Continuum 1.4.1
Description:
Apache Continuum is affected by a vulnerability in the version of the Struts library being used,
which allows a malicious user to run code on the server remotely. More details about the vulnerability
can be found at http://struts.apache.org/2.3.x/docs/s2-016.html.
Mitigation:
All users are recommended to upgrade to Continuum 1.4.2, which is not affected
by this issue.
References:
http://continuum.apache.org/security.html
Powered by blists - more mailing lists