Arbitrary code execution in Apache Struts 2
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 28, 2023
Description
Published by the National Vulnerability Database
Jul 16, 2013
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Nov 3, 2022
Last updated
Dec 28, 2023
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
References