grouper-users - Re: [grouper-users] Grouper's use of Apache Struts
Subject: Grouper Users - Open Discussion List
List archive
- From: Baron Fujimoto <>
- To: "Hyzer, Chris" <>
- Cc: Grouper Users <>
- Subject: Re: [grouper-users] Grouper's use of Apache Struts
- Date: Wed, 27 Sep 2017 09:41:13 -1000
- Ironport-phdr: 9a23:GTHxiRAOBriJGg98cqIAUyQJP3N1i/DPJgcQr6AfoPdwSPX5rsbcNUDSrc9gkEXOFd2CrakV26yO6+jJYi8p2d65qncMcZhBBVcuqP49uEgeOvODElDxN/XwbiY3T4xoXV5h+GynYwAOQJ6tL1LdrWev4jEMBx7xKRR6JvjvGo7Vks+7y/2+94fdbghMhzexe69+IAmrpgjNq8cahpdvJLwswRXTuHtIfOpWxWJsJV2Nmhv3+9m98p1+/SlOovwt78FPX7n0cKQ+VrxYES8pM3sp683xtBnMVhWA630BWWgLiBVIAgzF7BbnXpfttybxq+Rw1DWGMcDwULs5Qiqp4bt1RxD0iScHLz85/3/Risxsl6JQvRatqwViz4LIfI2ZMfxzca3HfdMeWGFPQMBfWSJcCY+4docCD+8NMOBFpIf/ulQOtwOzCwesCu3x1zFGhXH20qIm3Os8Ew7J0hctH84SvHnOsNn5KL0fXf6zwaLVzTvDdfRW2TLl5YXVaB8hu/aMXbRtesTR1EkvFQLFjlCXqYz5ODOey+MAvHOB4Op6UuKvjXUqqwFrrTmh3Mgsi4jJipgLxV/Z6CV02YA4LsC2Rk58ZN6rCppQtyeCOotwQ8MiWH1otDw1yr0Bp563ZDIFyIw9yBHDa/yIbZKE4hX5VOaeOTt4inJodKijiBa19EitzPD3WMqs0FtSsCZIk8XAu3II2hzd6cWIUedx80Ku1DqTywzc9ORJLlwomafbLpMsx6A8m5QdvEjbAyP6hkb7gLWLekgm5+Sk8fnrbq/4qpKaKoR6kBvxMr40lcy6Gek4MhYBX2yc+emk0b3s50z5QLFTgv0unanVrInWJMsFqqO3DQJZyIkj6xG4Dzep1NQXg2MLI05CeBKCl4TpOlfOL+7kDfqnnVihkStnyvLDM73vAZjCNWTPnbLucLph90JT1g8+wsxD659UD7wMJez/V0H/udDACx82KQ20w+LpCNVn0YMeXHqCDbSDP6PItl+I4PkiI+mWa44bojn9Kvkl6+TwgnAkhF8RZbOp0ocPaHCkAvRmJF2UYXX2gtcGDGcKphQxTPbzhF2fSj5ceWyyX7kn6zE/CYKmFpvDRpuzjLCb3Se7GIFWaX5cClCKD3joa5uIV+0SZy2PP88y2gADAPKBWp0sz1Xmnw/gyqEtZr7R8S0Jp5/5/Nlu7KvOjRw083p5A9nLgE+XSGQhtGoSQDl+8r19oEl61lDLhaJxmftePdxa+PpIU0E3OYOKnL8yMMz7Rg+UJoTBc12hWNjzRGhpE98=
Mahalo for the responses. For clarification, does the use of beanutils
1.9.2 which provides for the suppression of properties, including "class"
mean that this vulnerability is actually mitigated in Grouper?
It actually seems a little ambiguous, since the BEANUTILS-463 issue
indicates that the issue is addressable in BeanUtils 1.9.2, but
CVE-2014-0114 implicates beanutils versions "through 1.9.2". I'm assuming
the BEANUTILS-463 is correct and that the CVE-2014-0114 advisory could be
more clearly or accurately worded, but confirmation would be helpful.
Thanks also for the roadmap/timeline for Grouper's plans for Struts going
forward.
On Wed, Sep 27, 2017 at 03:36:52PM +0000, Hyzer, Chris wrote:
>Yes 1.2.4
>Yes the manifest is a reliable way to get the version
>We use beanutils 1.9.2: https://issues.apache.org/jira/browse/BEANUTILS-463
>Struts is only in UI, not WS
>We are trying to get struts out of Grouper by the end of the calendar year...
>
>Thanks
>Chris
>
>-----Original Message-----
>From:
>
>
>[mailto:]
> On Behalf Of Baron Fujimoto
>Sent: Tuesday, September 26, 2017 11:05 PM
>To: Grouper Users
><>
>Subject: [grouper-users] Grouper's use of Apache Struts
>
>Due to the recent high profile Equifax breach attributed to
>vulnerabilities in Apache Struts, use of Struts within our organization
>has come under scrutiny. It would help us to address concerns if these
>questions could be answered.
>
>It's our understanding that Grouper is not subject to recently announced
>vulnerabilities in Struts, e.g. CVE-2017-5638
><https://nvd.nist.gov/vuln/detail/CVE-2017-5638>, because they apply to
>older version of Struts 2, whereas Grouper uses Struts v1.
>
>How can you tell specifically which version of Struts is being used in a
>Grouper deployment? I dug this out of the UI's struts.jar MANIFEST:
>
>Specification-Title: Struts Framework
>Specification-Vendor: The Apache Software Foundation
>Specification-Version: 1.2.4
>
>Is this a reliable way to get the version information?
>
>Is the only place Grouper uses Struts in the UI? Not, say, by the WS?
>
>The assumed non-vulnerablity to CVE-2017-5638 notwithstanding, it was
>brought to our attention that Struts 1 is implicated in CVE-2014-0114
><https://nvd.nist.gov/vuln/detail/CVE-2014-0114>. Our Google-fu failed to
>turn up anything about this in the Grouper context. Has this risk been
>assessed for Grouper?
>
>If called for, would the mitigation strategy described here work with
>Grouper, or is there perhaps a fly in the ointment?
><https://devcentral.f5.com/articles/mitigating-the-apache-struts-classloader-manipulation-vulnerabilities-using-asm>
>
>It's also been pointed out to us that Struts 1 itself was EOL as of
>2013-04. Per their announcement, should a major security problem or a
>serious bug reported for Struts 1, no new releases or fixes fixes may be
>expected. <https://struts.apache.org/struts1eol-announcement.html>
>
>Given this, what is Grouper's future with regard to its use of Struts?
>
>Aloha,
>-baron
>--
>Baron Fujimoto
><>
> :: UH Information Technology Services
>minutas cantorum, minutas balorum, minutas carboratum desendus pantorum
--
Baron Fujimoto
<>
:: UH Information Technology Services
minutas cantorum, minutas balorum, minutas carboratum desendus pantorum
- [grouper-users] Grouper's use of Apache Struts, Baron Fujimoto, 09/27/2017
- RE: [grouper-users] Grouper's use of Apache Struts, Hyzer, Chris, 09/27/2017
- Re: [grouper-users] Grouper's use of Apache Struts, Baron Fujimoto, 09/27/2017
- RE: [grouper-users] Grouper's use of Apache Struts, Hyzer, Chris, 09/27/2017
Archive powered by MHonArc 2.6.19.