Arbitrary code execution in Apache Struts
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 27, 2023
Description
Published by the National Vulnerability Database
Jul 10, 2013
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Nov 3, 2022
Last updated
Dec 27, 2023
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
References