Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1870

Опубликовано: 17 авг. 2010
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS2: 5

Описание

The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.

РелизСтатусПримечание
dapper

not-affected

1.2.9-1ubuntu1
devel

not-affected

1.2.9-4
hardy

not-affected

1.2.9-3
jaunty

not-affected

1.2.9-3
karmic

not-affected

1.2.9-3
lucid

not-affected

1.2.9-3.1
upstream

released

2.2.1

Показывать по

Ссылки на источники

EPSS

Процентиль: 100%
0.9341
Критический

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.

nvd
больше 15 лет назад

The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.

debian
больше 15 лет назад

The OGNL extensive expression evaluation capability in XWork in Struts ...

github
больше 3 лет назад

Server side object manipulation in Apache Struts

CVSS3: 5.8
fstec
больше 15 лет назад

Уязвимость реализации класса преобразования выражений OGNL (Object-Graph Navigation Language) структуры шаблонов команд XWork программной платформы Apache Struts, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольные команды

EPSS

Процентиль: 100%
0.9341
Критический

5 Medium

CVSS2