Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-31805

Опубликовано: 12 апр. 2022
Источник: debian
EPSS Критический

Описание

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javanot-affectedpackage

Примечания

  • https://cwiki.apache.org/confluence/display/WW/S2-062

EPSS

Процентиль: 100%
0.93956
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

CVSS3: 8.1
redhat
почти 4 года назад

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

CVSS3: 9.8
nvd
почти 4 года назад

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

CVSS3: 9.8
github
почти 4 года назад

Expression Language Injection in Apache Struts

CVSS3: 9.8
fstec
почти 4 года назад

Уязвимость программной платформы Apache Struts, существующая из-за некорректной обработки выражений Object Graph Navigation Language, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.93956
Критический