Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN79099262/index.html | Third Party Advisory VDB Entry |
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000012 | Third Party Advisory VDB Entry |
http://struts.apache.org/2.3.1.2/docs/s2-007.html | Vendor Advisory |
https://issues.apache.org/jira/browse/WW-3668 | Issue Tracking Vendor Advisory |
Configurations
Information
Published : 2012-03-02 14:55
Updated : 2018-12-07 08:22
NVD link : CVE-2012-0838
Mitre link : CVE-2012-0838
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apache
- struts