Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 – Struts 2.5.25.
Recent assessments:
wvu-r7 at December 08, 2020 6:53pm UTC reported:
See my assessment on CVE-2019-0230. Apache themselves said this is similar to S2-059.
Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 2
jvn.jp/en/jp/JVN43969166/index.html
packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html
attackerkb.com/topics/mcp2xl4Va9/cve-2019-0230
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17530
cwiki.apache.org/confluence/display/WW/S2-061
security.netapp.com/advisory/ntap-20210115-0005/
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpujan2021.html