ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/32495 | third party advisory vendor advisory |
http://fisheye6.atlassian.com/cru/CR-9/ | patch |
http://struts.apache.org/2.x/docs/s2-003.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46328 | vdb entry |
http://www.vupen.com/english/advisories/2008/3003 | vdb entry vendor advisory |
http://www.vupen.com/english/advisories/2008/3004 | vdb entry |
http://www.securityfocus.com/bid/32101 | vdb entry |
http://secunia.com/advisories/32497 | third party advisory vendor advisory |
http://jira.opensymphony.com/browse/XW-641 | exploit |
http://issues.apache.org/struts/browse/WW-2692 | exploit |
http://osvdb.org/49732 | vdb entry |