CVE-2019-0233
Description
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Struts 2.0.0 through 2.5.20 allow an attacker to cause a denial of service via file upload by overriding file access permissions.
Vulnerability
Description
CVE-2019-0233 is a vulnerability in Apache Struts 2, versions 2.0.0 to 2.5.20, where an access permission override during file upload can lead to a Denial of Service (DoS). The root cause is that stack-accessible values of types java.io.File and java.nio.File, as well as other classes from these packages, are not properly protected by the framework, allowing an attacker to manipulate the request to set the working copy of an uploaded file to read-only, or even make the Servlet container's temporary directory read-only [1][2].
Exploitation and
Impact
To exploit this, an attacker can perform a file upload to an Action that exposes the file via a getter. By crafting a malicious request, the attacker can override the permissions of the uploaded file's working copy, causing subsequent operations on that file to fail. In a more severe scenario, the attacker might set the Servlet container's temporary directory to read-only, which would cause all subsequent file upload actions in that container to fail, effectively resulting in a Denial of Service [2]. The attack requires the ability to upload a file to an affected Struts 2 application, but no authentication is explicitly required if the upload action is publicly accessible.
Mitigation and
Remediation
The vulnerability is fixed in Apache Struts 2.5.22, which excludes classes from java.io and java.nio from property evaluation by default, preventing the dangerous property manipulation [2]. Users are strongly advised to upgrade to version 2.5.22 or later. For those who cannot upgrade immediately, a workaround exists: add java.io. and java.nio. to the struts.excludedPackageNames constant in the struts-default.xml configuration file to block access to these packages [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.struts:struts2-coreMaven | >= 2.0.0, < 2.5.22 | 2.5.22 |
Affected products
2- Apache/Strutsdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-ccp5-gg58-pxfmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-0233ghsaADVISORY
- cwiki.apache.org/confluence/display/ww/s2-060ghsax_refsource_MISCWEB
- launchpad.support.sap.comghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujan2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.