Описание
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| lucid | not-affected | |
| precise | not-affected | |
| quantal | not-affected | |
| raring | not-affected | |
| upstream | not-affected |
Показывать по
EPSS
9.3 Critical
CVSS2
Связанные уязвимости
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arb ...
Уязвимость реализации класса преобразования выражений OGNL (Object-Graph Navigation Language) программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код
EPSS
9.3 Critical
CVSS2