[MAVEN:GHSA-X5FC-PGPX-59J5] Server side object manipulation in Apache Struts
Severity
Moderate
Affected Packages
1
Fixed Packages
1
CVEs
1
OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the '#'-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context objects. This behavior was already addressed in S2-003, but it turned out that the resulting fix based on whitelisting acceptable parameter names closed the vulnerability only partially.
Package | Affected Version |
---|---|
pkg:maven/org.apache.struts/struts2-core | < 2.2.1 |
Package | Fixed Version |
---|---|
pkg:maven/org.apache.struts/struts2-core | = 2.2.1 |
- ID
- MAVEN:GHSA-X5FC-PGPX-59J5
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-x5fc-pgpx-59j5
- Published
-
2022-05-13T01:14:26
(2 years ago) - Modified
-
2023-08-26T05:02:34
(12 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.apache.struts/struts2-core | org.apache.struts | struts2-core | < 2.2.1 | |||
Fixed | pkg:maven/org.apache.struts/struts2-core | org.apache.struts | struts2-core | = 2.2.1 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |