Home > Guides > Core Developers Guide > Security |
The Apache Struts 2 doesn't provide any security mechanism - it is just a pure web framework. Below are few tips you should consider during application development with the Apache Struts 2.
Config Browser Plugin exposes internal configuration and should be used only during development phase. If you must use it on production site, we strictly recommend restricting access to it - you can use Basic Authentication or any other security mechanism (e.g. Apache Shiro)
Very often access to different resources is controlled based on URL patterns, see snippet below. Because of that you cannot mix actions with different security levels in the same namespace. Always group actions in one namespace by security level.
You must always hide JSP file behind an action, you cannot allow for direct access to the JSP files as this can leads to unpredictable security vulnerabilities. You can achieve this by putting all your JSP files under the WEB-INF
folder - most of the JEE containers restrict access to files placed under the WEB-INF
folder. Second option is to add security constraint to the web.xml
file:
The best approach is to used the both solutions.
The Apache Struts 2 contains internal security manager which blocks access to particular classes and Java packages - it's a OGNL-wide mechanism which means it affects any aspect of the framework ie. incoming parameters, expressions used in JSPs, etc.
The defaults are as follow:
Any expression or target which evaluates to one of these will be blocked and you see a WARN in logs:
[WARNING] Target class [class example.MyBean] or declaring class of member type [public example.MyBean()] are excluded!
In that case new MyBean()
was used to create a new instance of class (inside JSP) - it's blocked because target
of such expression is evaluated to java.lang.Class
This can impact actions which have large inheritance hierarchy and use the same method's name throughout the hierarchy, this was reported as an issue WW-4405. See the example below:
In such case OGNL cannot properly map which method to call when request is coming. This is do the OGNL limitation. To solve the problem don't use the same method's names through the hierarchy, you can simply change the action's method from save()
to saveAction()
and leaving annotation as is to allow call this action via /save.action
request.
As from version 2.3.20 the framework provides two new interfaces which are used to accept / exclude param names and values - AcceptedPatternsChecker and ExcludedPatternsChecker with default implementations. These two interfaces are used by Parameters Interceptor and Cookie Interceptor to check if param can accepted or must be excluded. If you were using excludeParams
previously please compare patterns used by you with these provided by the framework in default implementation.