Описание
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Ссылки
- Product
- ExploitThird Party Advisory
- Broken Link
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Patch
- Third Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Product
- ExploitThird Party Advisory
- Broken Link
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одно из
EPSS
9.8 Critical
CVSS3
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute ...
Уязвимость реализации механизма сопоставления действий DefaultActionMapper программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код
EPSS
9.8 Critical
CVSS3
9.3 Critical
CVSS2