CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.9%
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Recent assessments:
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
archiva.apache.org/security.html
cxsecurity.com/issue/WLB-2014010087
osvdb.org/98445
packetstormsecurity.com/files/159629/Apache-Struts-2-Remote-Code-Execution.html
seclists.org/fulldisclosure/2013/Oct/96
seclists.org/oss-sec/2014/q1/89
struts.apache.org/release/2.3.x/docs/s2-016.html
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html
www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
www.securityfocus.com/bid/61189
www.securityfocus.com/bid/64758
www.securitytracker.com/id/1029184
www.securitytracker.com/id/1032916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2251
exchange.xforce.ibmcloud.com/vulnerabilities/90392
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.9%