Description
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
Remediation
References
http://struts.apache.org/struts-doc-1.2.9/userGuide/release-notes.html
http://issues.apache.org/bugzilla/show_bug.cgi?id=38374
http://www.securityfocus.com/bid/17342
http://securitytracker.com/id?1015856
http://secunia.com/advisories/19493
http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html
http://secunia.com/advisories/20117
http://www.vupen.com/english/advisories/2006/1205
https://exchange.xforce.ibmcloud.com/vulnerabilities/25612
http://mail-archives.apache.org/mod_mbox/struts-user/200601.mbox/%3c20060121221800.15814.qmail%40web32607.mail.mud.yahoo.com%3e
http://mail-archives.apache.org/mod_mbox/struts-dev/200601.mbox/%3cdr169r%24623%242%40sea.gmane.org%3e
Related Vulnerabilities
CVE-2018-25058 Vulnerability in npm package twitter-fetcher
CVE-2023-2585 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2014-3574 Vulnerability in maven package org.apache.poi:poi-ooxml
CVE-2020-15174 Vulnerability in npm package electron
CVE-2022-2390 Vulnerability in maven package com.google.android.gms:play-services-basement