Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wxw2-2mx5-c5qf

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Improper Input Validation in OpenSymphony XWork

ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.

Пакеты

Наименование

com.opensymphony:xwork

maven
Затронутые версииВерсия исправления

< 2.0.6

2.0.6

Наименование

com.opensymphony:xwork

maven
Затронутые версииВерсия исправления

>= 2.1.0, < 2.1.2

2.1.2

EPSS

Процентиль: 98%
0.65118
Средний

Дефекты

CWE-20

Связанные уязвимости

redhat
больше 17 лет назад

ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.

nvd
почти 17 лет назад

ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.

EPSS

Процентиль: 98%
0.65118
Средний

Дефекты

CWE-20