Software:Apache Struts 2
|Developer(s)||Apache Software Foundation|
|Initial release||October 10, 2006|
2.5.26 / December 6, 2020
|License||Apache License 2.0|
Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model–view–controller (MVC) architecture. The WebWork framework spun off from Apache Struts 1 aiming to offer enhancements and refinements while retaining the same general architecture of the original Struts framework. In December 2005, it was announced that WebWork 2.2 was adopted as Apache Struts 2, which reached its first full release in February 2007.
Struts 2 has a history of critical security bugs, many tied to its use of OGNL technology; some vulnerabilities can lead to arbitrary code execution. In October 2017, it was reported that failure by Equifax to address a Struts 2 vulnerability advised in March 2017 was later exploited in the data breach that was disclosed by Equifax in September 2017.
- Simple POJO-based actions
- Simplified testability
- Thread safe
- AJAX support
- Template support
- Support for different result types
- Easy to extend with plugins
- REST plugin (REST-based actions, extension-less URLs)
- Convention plugin (action configuration via Conventions and Annotations)
- Spring plugin (dependency injection)
- Hibernate plugin
- Support in design
- JFreechart plugin (charts)
- jQuery plugin (Ajax support, UI widgets, dynamic table, charts)
- Rome plugin
- "06 December 2020 - Struts 2.5.26 General Availability". https://struts.apache.org/announce.html#a20201206.
- About Apache Struts 2
- "Apache Struts : List of security vulnerabilities". https://www.cvedetails.com/vulnerability-list/vendor_id-45/product_id-6117/Apache-Struts.html.
- Munoz, Alvaro (January 14, 2014). "Struts 2: OGNL Expression Injections". https://community.saas.hpe.com/t5/Security-Research/Struts-2-OGNL-Expression-Injections/ba-p/288881#.WdL6ca2ZNxw.
- Chirgwin, Richard (October 2, 2017). "Equifax couldn't find or patch vulnerable Struts implementations". https://www.theregister.co.uk/2017/10/02/equifax_ceo_richard_smith_congressional_testimony/?mt=1506988904204.
- Goodin, Dan (October 2, 2017). "A series of delays and major errors led to massive Equifax breach". https://arstechnica.com/information-technology/2017/10/a-series-of-delays-and-major-errors-led-to-massive-equifax-breach/.
Original source: https://en.wikipedia.org/wiki/ Apache Struts 2. Read more