Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-31805

Опубликовано: 12 апр. 2022
Источник: redhat
CVSS3: 8.1
EPSS Критический

Описание

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

Отчет

Apache Struts2 is not compiled, shipped, used, or enabled in Red Hat products. As such, any CVE against Apache Struts2 does not impact currently supported Red Hat products. This statement was last revised on 1 Sept 2020. Previous statement example: https://bugzilla.redhat.com/show_bug.cgi?id=1469265

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Fuse 6strutsNot affected
Red Hat JBoss Fuse Service Works 6strutsNot affected
Red Hat JBoss Operations Network 3strutsNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-917
https://bugzilla.redhat.com/show_bug.cgi?id=2074788Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.

EPSS

Процентиль: 100%
0.93956
Критический

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

CVSS3: 9.8
nvd
почти 4 года назад

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

CVSS3: 9.8
debian
почти 4 года назад

The fix issued for CVE-2020-17530 was incomplete. So from Apache Strut ...

CVSS3: 9.8
github
почти 4 года назад

Expression Language Injection in Apache Struts

CVSS3: 9.8
fstec
почти 4 года назад

Уязвимость программной платформы Apache Struts, существующая из-за некорректной обработки выражений Object Graph Navigation Language, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.93956
Критический

8.1 High

CVSS3