Chatee ahora con Soporte
Chat con el soporte
Herramientas de autoservicio
Base de conocimientos
Mi cuenta
Notificaciones y alertas
Soporte de productos
Descargas de software
Documentación técnica
Foros de usuarios
Tutoriales en video
Aviso de actualizaciones de páginas web (RSS)
Aspectos esenciales de soporte
Premios y testimonios
Introducción
Acuerdo de licencia
Guía de soporte

Stat Notificación de productos

Regresar
Alertas críticas
Critical Notification

Stat (Apache Struts Vulnerability)

A critical security vulnerability with the Jakarta Multipart parser in certain versions of Apache Struts was documented on March 10, 2017. Please check here for more details about the security vulnerability.  All supported versions of Stat use an impacted version of Apache Struts.  

How does this affect me?

The Apache Struts vulnerability is exposed in Stat. This may allow remote code execution when performing file upload based on Jakarta plugin. Please note, most Stat environments are behind a firewall. The risk of exploitation will most likely be limited to people within the firewall depending on your setup.  

Workaround

Customers running Stat versions 5.8.0 and 5.8.1 can be updated with a hotfix. Please see the related Knowledge Base articles for further details on the hotfixes. Customers running Stat version 5.7.0 - 5.7.4 are encouraged to upgrade to a 5.8.x version and apply the hotfix.

 Stat 5.8.1 hf-c to address CVE-2017-5638 vulnerability

 Stat 5.8.0 hf-e for CVE-2017-5638 vulnerability

If you are unable to upgrade your 5.7.x version, there is an option that will allow you to eliminate the security restriction but will limit the usability of some UI functions in the Web Client. Further details are available in the related Knowledge Base article. 

Stat 5.7.x workaround to address CVE-2017-5638 vulnerability

Status

The next release of the software will include an updated version of Apache Struts. Notifications will be sent out regarding new releases when available.