QID 376539

Date Published: 2022-04-13

QID 376539: Apache Struts2 Remote Code Execution (RCE) Vulnerability (S2-062)

Apache Struts is an open-source Model-View-Controller (MVC) framework for creating elegant, modern Java web applications.

A flaw was found in the Apache Struts frameworks. When forced some of the tags attributes perform a double evaluation if a developer applies forced OGNL evaluation by using the %{...} syntax. Using a forced OGNL evaluation on untrusted user input allows an attacker to perform remote code execution and security degradation.

Affected Versions:
Apache Struts 2.5.29 and prior

An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code on the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution

    Customers are advised to upgrade Apache Struts 2.5.30 or higher. Please refer to the S2-062 advisory for more information pertaining to this vulnerability.

    CVEs related to QID 376539

    Software Advisories
    Advisory ID Software Component Link
    S2-062 URL Logo cwiki.apache.org/confluence/display/WW/S2-062