ClassLoader manipulation vulnerability

XMLWordPrintable

      We have fixed a vulnerability in our fork of Apache Struts. Attackers can use this vulnerability to execute Java code of their choice on systems that use these frameworks. The attacker needs to be able to access the Crowd web interface. In cases when anonymous access is enabled, a valid user account is not required to exploit this vulnerability.

      We have discovered this vulnerability during our review of the recent Struts security advisories. This vulnerability is specific to Crowd.

      The vulnerability affects all supported version of Crowd. For more information see the full advisory.

            Assignee:
            Diego Berrueta
            Reporter:
            VitalyA
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated:
              Resolved: