5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.085 Low
EPSS
Percentile
94.4%
OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the ‘#’-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context objects. This behavior was already addressed in S2-003, but it turned out that the resulting fix based on whitelisting acceptable parameter names closed the vulnerability only partially.
blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html
confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16
packetstormsecurity.com/files/159643/LISTSERV-Maestro-9.0-8-Remote-Code-Execution.html
seclists.org/fulldisclosure/2010/Jul/183
seclists.org/fulldisclosure/2020/Oct/23
struts.apache.org/2.2.1/docs/s2-005.html
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140709-struts2
cwiki.apache.org/confluence/display/WW/S2-003
github.com/apache/struts
nvd.nist.gov/vuln/detail/CVE-2010-1870