Apache Struts vulnerable to arbitrary remote code execution due to improper input validation
Critical severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 29, 2023
Package
Affected versions
>= 2.3.19, < 2.3.20.3
>= 2.3.21, < 2.3.24.3
>= 2.3.25, < 2.3.28.1
Patched versions
2.3.20.3
2.3.24.3
2.3.28.1
Description
Published by the National Vulnerability Database
Jun 7, 2016
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Dec 29, 2023
Last updated
Dec 29, 2023
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an
!
(exclamation mark) operator to the REST Plugin.References