Lucene search

K
githubGitHub Advisory DatabaseGHSA-PW8R-X2QM-3H5M
HistoryMay 14, 2022 - 1:57 a.m.

Arbitrary code execution in Apache Struts 2

2022-05-1401:57:01
CWE-94
GitHub Advisory Database
github.com
26
apache struts 2
code execution
vulnerability
ognl

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.947

Percentile

99.3%

Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both “${}” and “%{}” sequences, which causes the OGNL code to be evaluated twice.

Affected configurations

Vulners
Node
org.apache.struts.xworkxwork-coreRange2.0.02.3.14.3
OR
org.apache.strutsstruts2-coreRange2.0.02.3.14.3
VendorProductVersionCPE
org.apache.struts.xworkxwork-core*cpe:2.3:a:org.apache.struts.xwork:xwork-core:*:*:*:*:*:*:*:*
org.apache.strutsstruts2-core*cpe:2.3:a:org.apache.struts:struts2-core:*:*:*:*:*:*:*:*

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.947

Percentile

99.3%