CVE-2023-34396: Apache Struts vulnerable to memory exhaustion
(updated )
Denial of service via out of memory (OOM) owing to no sanity limit on normal form fields in multipart forms. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to an OOM if developer has set struts.multipart.maxSize to a value equal or greater than the available memory.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater
References
- cwiki.apache.org/confluence/display/WW/S2-064
- github.com/advisories/GHSA-4g42-gqrg-4633
- github.com/apache/struts
- github.com/apache/struts/commit/2d6f1bc0a6f5ac575a56784ac6461816b67c4f21
- github.com/apache/struts/releases/tag/STRUTS_2_5_31
- github.com/apache/struts/releases/tag/STRUTS_6_1_2_1
- nvd.nist.gov/vuln/detail/CVE-2023-34396
- security.netapp.com/advisory/ntap-20230706-0005
Detect and mitigate CVE-2023-34396 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →