[ 
https://issues.apache.org/jira/browse/WW-4867?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Parthiban Palanisamy updated WW-4867:
-------------------------------------
    Priority: Trivial  (was: Blocker)

> Apache Struts framework 1.1 and 2.x vulnerability clarification
> ---------------------------------------------------------------
>
>                 Key: WW-4867
>                 URL: https://issues.apache.org/jira/browse/WW-4867
>             Project: Struts 2
>          Issue Type: Temp
>         Environment: apache Struts framework 1.1
>            Reporter: Parthiban Palanisamy
>            Priority: Trivial
>              Labels: documentation
>
> Hello, 
> I'm the active user of apache Struts framework 1.1 and 2.x. Recently we 
> learned that there is a vulnerability in Apache Struts' Jakarta Multipart 
> parser as high risk. This may lead to warning of remote code execution (RCE) 
> attacks that were evident at Equifax which lead to complete system 
> compromises. So I would like to take your inputs and understand the recent 
> vulnerability over RCE is also affected 1.1/1.x versions precisely. 
> If yes, could you please support with your thoughts over next course of 
> action to resolve the issue? 
> Thanks and appreciate your support at the earliest. 
> Regards,
> Parthiban



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to