|Multi Request||TreasuryDirect.gov Vulnerability to Apache Struts CVE-2017-5638|
|Submitted||June 16, 2018|
|Due||July 16, 2018|
|Est. Completion||Aug. 14, 2018|
MuckRock users can file, duplicate, track, and share public records requests like this one. Learn more.
To Whom It May Concern:
Pursuant to the Freedom of Information Act, I hereby request the following records:
Records relating to whether TreasuryDirect.gov and/or other Bureau of Fiscal Service websites were vulnerable to the Apache Struts vulnerability reported in CVE-2017-5638 on March 10th, 2017 and if so, when the webserver(s) were patched with the appropriate Apache Struts updates to mitigate the vulnerability. The first versions to contain fixes were Struts 2.3.32 or Struts 18.104.22.168 and all versions of Struts 2.3 and 2.5 after 2.3.5 and 2.5 were vulnerable.
I am in particular interested in the user flow beginning at https://www.treasurydirect.gov/RS/UN-Display.do as the `.do` extension is typically associated with Apache Struts webservers. I am also requesting that any fees be waived as the CVE 2017-5638 vulnerability is of notable public interest as it was used in the Equifax data breach of 143 million Americans announced in September of 2017.
The requested documents will be made available to the general public, and this request is not being made for commercial purposes.
In the event that there are fees, I would be grateful if you would inform me of the total charges in advance of fulfilling my request. I would prefer the request filled electronically, by e-mail attachment if available or CD-ROM if not.
Thank you in advance for your anticipated cooperation in this matter. I look forward to receiving your response to this request within 20 business days, as the statute requires.
Please see the attached letter in reference to the above-mentioned FOIA request.
Denise K. Nelson
Legislative & Public Affairs
Bureau of the Fiscal Service