Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1036017 | vdb entry |
https://www.exploit-db.com/exploits/39919/ | exploit |
http://struts.apache.org/docs/s2-033.html | vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg21987854 | |
http://www.securityfocus.com/bid/90960 | vdb entry |