Описание
Improper Control of Generation of Code in Apache Struts
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-1965
- https://github.com/apache/struts/commit/7e6f641ebb142663cbd1653dc49bed725edf7f56
- https://bugzilla.redhat.com/show_bug.cgi?id=967655
- https://web.archive.org/web/20140227231557/http://www.securityfocus.com/bid/60082
- http://struts.apache.org/development/2.x/docs/s2-012.html
Пакеты
org.apache.struts:struts2-core
< 2.3.14.3
2.3.14.3
Связанные уязвимости
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 b ...
Уязвимость приложения Apache Struts Showcase программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код OGNL