Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Link | Tags |
---|---|
https://cwiki.apache.org/confluence/display/WW/S2-061 | vendor advisory |
http://jvn.jp/en/jp/JVN43969166/index.html | third party advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | patch third party advisory |
http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html | vdb entry third party advisory |
https://security.netapp.com/advisory/ntap-20210115-0005/ | patch third party advisory |
https://www.oracle.com/security-alerts/cpuApr2021.html | patch third party advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | patch third party advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | patch third party advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | patch third party advisory |
http://www.openwall.com/lists/oss-security/2022/04/12/6 | mailing list third party advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory |