VYPR
Medium severity5.9NVD Advisory· Published Sep 20, 2017· Updated May 13, 2026

CVE-2016-8738

CVE-2016-8738

Description

In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.struts:struts2-coreMaven
>= 2.5.0, < 2.5.132.5.13

Affected products

1
  • Apache Software Foundation/Apache Strutsv5
    Range: 2.5 - 2.5.5

Patches

1
554b9dddb0fb

Trims input value

https://github.com/apache/strutsLukasz LenartNov 16, 2016via ghsa
1 file changed · +1 1
  • core/src/main/java/com/opensymphony/xwork2/validator/validators/URLValidator.java+1 1 modified
    @@ -55,7 +55,7 @@ public void validate(Object object) throws ValidationException {
                 return;
             }
     
    -        if (!(value.getClass().equals(String.class)) || !Pattern.compile(getUrlRegex(), Pattern.CASE_INSENSITIVE).matcher(String.valueOf(value)).matches()) {
    +        if (!(value.getClass().equals(String.class)) || !Pattern.compile(getUrlRegex(), Pattern.CASE_INSENSITIVE).matcher(String.valueOf(value).trim()).matches()) {
                 addFieldError(fieldName, object);
             }
         }
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.