Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
References
- https://nvd.nist.gov/vuln/detail/CVE-2014-7809
- http://packetstormsecurity.com/files/129421/Apache-Struts-2.3.20-Security-Fixes.html
- http://struts.apache.org/docs/s2-023.html
- http://www.securityfocus.com/archive/1/534175/100/0/threaded
- http://www.securityfocus.com/bid/71548
- http://www.securitytracker.com/id/1031309
- https://github.com/advisories/GHSA-h4v9-jf2r-9h6m