Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-2135

Опубликовано: 16 июл. 2013
Источник: debian
EPSS Высокий

Описание

Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javanot-affectedpackage

Примечания

  • http://struts.apache.org/release/2.3.x/docs/s2-015.html

EPSS

Процентиль: 99%
0.83459
Высокий

Связанные уязвимости

ubuntu
больше 12 лет назад

Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.

redhat
больше 12 лет назад

Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.

nvd
больше 12 лет назад

Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.

github
больше 3 лет назад

Arbitrary code execution in Apache Struts 2

CVSS3: 9.6
fstec
больше 12 лет назад

Уязвимость реализации класса преобразования выражений OGNL (Object-Graph Navigation Language) программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.83459
Высокий