Developer(s) | Apache Software Foundation |
---|---|
Initial release | October 10, 2006; 18 years ago (2006-10-10) |
Stable release | 6.4.0 / April 19, 2024; 8 months ago (2024-04-19) |
Repository | |
Written in | Java |
Operating system | Cross-platform |
Platform | Cross-platform (JVM) |
Predecessor | Apache Struts 1 |
Type | Web framework |
License | Apache License 2.0 |
Website | struts |
Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model–view–controller (MVC) architecture. The WebWork framework spun off from Apache Struts 1 aiming to offer enhancements and refinements while retaining the same general architecture of the original Struts framework. In December 2005, it was announced that WebWork 2.2 was adopted as Apache Struts 2, which reached its first full release in February 2007.
Struts 2 has a history of critical security bugs, many tied to its use of OGNL technology; some vulnerabilities can lead to arbitrary code execution. In October 2017, it was reported that failure by Equifax to address a Struts 2 vulnerability advised in March 2017 was later exploited in the data breach that was disclosed by Equifax in September 2017.
Features
- Simple POJO-based actions
- Simplified testability
- Thread safe
- AJAX support
- jQuery plugin
- Dojo Toolkit plugin (deprecated)
- Ajax client-side validation
- Template support
- Support for different result types
- Easy to extend with plugins
- REST plugin (REST-based actions, extension-less URLs)
- Convention plugin (action configuration via Conventions and Annotations)
- Spring plugin (dependency injection)
- Hibernate plugin
- Support in design
- JFreechart plugin (charts)
- jQuery plugin (Ajax support, UI widgets, dynamic table, charts)
- Rome plugin
See also
Citations
- "Announcements 2024". Retrieved 17 June 2024.
- About Apache Struts 2 Archived January 14, 2014, at the Wayback Machine
- "Apache Struts : List of security vulnerabilities". cvedetails.com. Retrieved October 2, 2017.
- Munoz, Alvaro (January 14, 2014). "Struts 2: OGNL Expression Injections". HPE.com. Retrieved October 2, 2017.
- Chirgwin, Richard (October 2, 2017). "Equifax couldn't find or patch vulnerable Struts implementations". The Register. Retrieved October 2, 2017.
- Goodin, Dan (October 2, 2017). "A series of delays and major errors led to massive Equifax breach". Ars Technica. Retrieved October 2, 2017.
- Newton 2009, p. 9, §1 Struts and Agile Development - Actions.
- Newton 2009, p. 258, §13 Rich Internet Applications - Dojo tags.
- Newton 2009, p. 294, §12 Comprehensive Testing - Detour: Struts and Spring in a nutshell.
- Newton 2009, pp. 57–81, §4 Results and Result Types - Dojo tags.
- Newton 2009, pp. 249–255, §12 Themes and Templates - The REST plug-in.
- Newton 2009, p. 294, §13 Comprehensive Testing - Detour: Struts and Spring in a nutshell.
References
- Newton, Dave (2009). Apache Struts 2 Web Application Development. Packt Publishing. ISBN 978-1-84719-339-1.
External links
Web frameworks | |
---|---|
.NET | |
C++ | |
ColdFusion | |
Common Lisp | |
Haskell | |
Java | |
JavaScript | |
Perl | |
PHP | |
Python | |
Ruby | |
Rust | |
Scala | |
Smalltalk | |
Other languages |
Java (software platform) | |||||||
---|---|---|---|---|---|---|---|
Platforms |
| ||||||
Oracle technologies | |||||||
Platform technologies | |||||||
Major third-party technologies | |||||||
History | |||||||
JVM languages | |||||||
Community |
| ||||||
Category Computer programming portal |