QID 376539
Date Published: 2022-04-13
QID 376539: Apache Struts2 Remote Code Execution (RCE) Vulnerability (S2-062)
Apache Struts is an open-source Model-View-Controller (MVC) framework for creating elegant, modern Java web applications.
A flaw was found in the Apache Struts frameworks. When forced some of the tags attributes perform a double evaluation if a developer applies forced OGNL evaluation by using the %{...} syntax. Using a forced OGNL evaluation on untrusted user input allows an attacker to perform remote code execution and security degradation.
Affected Versions:
Apache Struts 2.5.29 and prior
An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code on the system.
Customers are advised to upgrade Apache Struts 2.5.30 or higher. Please refer to the S2-062 advisory for more information pertaining to this vulnerability.
CVEs related to QID 376539
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| S2-062 |
|