Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug Businesses Media Open Source Privacy Security Software Apache

A Critical Apache Struts Security Flaw Makes It 'Easy' To Hack Fortune 100 Firms (zdnet.com) 42

An anonymous reader quotes a report from ZDNet: A critical security vulnerability in open-source server software enables hackers to easily take control of an affected server -- putting sensitive corporate data at risk. The vulnerability allows an attacker to remotely run code on servers that run applications using the REST plugin, built with Apache Struts, according to security researchers who discovered the vulnerability. All versions of Struts since 2008 are affected, said the researchers. Apache Struts is used across the Fortune 100 to provide web applications in Java, and it powers front- and back-end applications. Man Yue Mo, a security researcher at LGTM, who led the effort that led to the bug's discovery, said that Struts is used in many publicly accessible web applications, such as airline booking and internet banking systems. Mo said that all a hacker needs "is a web browser." "I can't stress enough how incredibly easy this is to exploit," said Bas van Schaik, product manager at Semmle, a company whose analytical software was used to discover the vulnerability. The report notes that "a source code fix was released some weeks prior, and Apache released a full patch on Tuesday to fix the vulnerability." It's now a waiting game for companies to patch their systems.
This discussion has been archived. No new comments can be posted.

A Critical Apache Struts Security Flaw Makes It 'Easy' To Hack Fortune 100 Firms

Comments Filter:
  • It took a simple web page and split it over multiple config files. And it did little to help larger ones. It should never have been used. But has been considered obsolete for some time now.

  • Screening out new hires. We had a candidate say he'd use Struts for a new project, and that was 2015. Needless to say, he never dug out of that rut in the interview. Any non-junior Java application developer who doesn't have Grails, Play, Spring Boot or DropWizard experience is an automatic "don't hire, next" for every Java team I have met that was halfway decent or better.

  • Back-end commands being absorbed through the front end... again: https://xkcd.com/327/ [xkcd.com]
  • The Mad Gadget vulnerability strikes again. https://opensource.googleblog.... [googleblog.com]

"Pok pok pok, P'kok!" -- Superchicken

Working...