Background
A High rated vulnerability was discovered in the Struts framework a month or so ago. All versions of Struts from 2 to 2.3.1.1 are vulnerable According to the Struts team the vulnerability :
- "allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject a malicious expression in any exposed string variable for further evaluation."
A few questions:
- Is your company vulnerable?
- Would you even know if you are vulnerable?
- Do you even know if your company is using Struts?
Simple Fix
The fix is pure and simple - Upgrade to Struts 2.3.1.2
But then to quote Oscar Wilde:
"The truth is rarely pure and never simple. "
Discussion
The problem is that there are huge numbers of applications running vulnerable versions of Struts which are unlikely to have been patched with the new version. This could be because companies neither know about the vulnerability nor know that their online applications are using Struts. In many cases the applications have been in production for a few years and the development teams have long since moved on.
While the applications may have been secure at launch, the discovery of the Struts vulnerability now means that these applications are vulnerable. This could well mean that a company is no longer PCI DSS compliant.
While the Simple Fix above is simple, the reality is that it won't be applied because organizations do not know that they are vulnerable.
This is especially a problem with open-source type libraries and frameworks. There is no standard mechanism for publishing information on vulnerabilities. They fall between the cracks. Operations staff are usually aware of OS type vulnerabilities, but not of these types of application frameworks or libraries.
A joint study conducted by Sonatype and Aspect Security found that more than 50 percent of the world’s largest corporations have open source applications with security vulnerabilities.
Real Fix
The real fix lies in having a proper Secure Development Life Cycle in place - in particular a post-production process for identifying newly discovered security vulnerabilities and ensuring that appropriate security fixes are applied.
So here are suggested steps:
- When a new application is being rolled out to production, make sure that it is registered with the corporate Asset Register. This should include information about any frameworks, libraries etc. that the application relies on.
- The operational risk team should monitor for any vulnerabilities in the libraries and frameworks.
- If vulnerabilities are discovered, the operational risk team can look in the corporate Asset Register to identify any impacted applications
- Appropriate fixes can then be applied
Useful Links:
- Details on Apache Struts Website
- Compass Security Movie - Tutorial
- Struts 2.3.1.2.
- Sonatype and Aspect Security Study on use of vulnerable Open Source Components
- Oscar Wilde Quote
Social: del.icio.us DiggIt! Reddit Stumble Google Bookmarks Technorati Slashdot
This is an interesting blog that you have posted, you shares a lot of useful things about Technology.
ReplyDeleteStruts Training in Chennai
Struts Training
Struts Training institutes in Chennai
Wordpress Training
Wordpress Training Chennai
Struts Training in Velachery
Struts Training in Tambaram