CVE-2023-34149: Apache Struts vulnerable to memory exhaustion
(updated )
Denial of service via out of memory (OOM) owing to not properly checking of list bounds. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to OOM if developer has set struts.multipart.maxSize to a value equal or greater than the available memory.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
References
- cwiki.apache.org/confluence/display/WW/S2-063
- github.com/advisories/GHSA-8f6x-v685-g2xc
- github.com/apache/struts
- github.com/apache/struts/commit/2d6f1bc0a6f5ac575a56784ac6461816b67c4f21
- github.com/apache/struts/releases/tag/STRUTS_2_5_31
- github.com/apache/struts/releases/tag/STRUTS_6_1_2_1
- nvd.nist.gov/vuln/detail/CVE-2023-34149
- security.netapp.com/advisory/ntap-20230706-0005
Detect and mitigate CVE-2023-34149 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →