The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.
References
- https://nvd.nist.gov/vuln/detail/CVE-2012-4386
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78182
- https://issues.apache.org/jira/browse/WW-3858
- http://struts.apache.org/2.x/docs/s2-010.html
- http://www.openwall.com/lists/oss-security/2012/09/01/4
- http://www.openwall.com/lists/oss-security/2012/09/01/5
- https://github.com/advisories/GHSA-2rvh-q539-q33v