### Summary
A crafted XML request can be used to perform a DoS attack when using the Struts REST plugin
| | |
| :------------ | :------------ |
| Who should read this | All Struts 2 developers and users which are using the REST plugin |
| Impact of vulnerability | A DoS attack is possible when using XStream handler with the Struts REST plugin. |
| Maximum security rating | Medium |
| Recommendation | Upgrade to Struts 2.5.16 |
| Affected Software | Struts 2.1.1 - Struts 2.5.14.1 |
| Reporter | Yevgeniy Grushka & Alvaro Munoz from HPE |
| CVE Identifier | CVE-2018-1327 |
### Problem
The REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload.
### Solution
Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
### Backward compatibility
No backward incompatibility issues are expected.
### Workaround
Use Jackson XML handler instead of the default XStream handler as described [here](http://struts.apache.org/plugins/rest/#custom-contenttypehandlers).
暂无评论