Lucene search

K
githubGitHub Advisory DatabaseGHSA-47QP-8V9G-39HP
HistoryMay 13, 2022 - 1:14 a.m.

Code injection in Apache Struts

2022-05-1301:14:26
CWE-20
GitHub Advisory Database
github.com
18

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%

The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with β€œaction:” or β€œredirect:”, followed by a desired navigational target expression. This mechanism was intended to help with attaching navigational information to buttons within forms.

In Struts 2 before 2.3.15.1 the information following β€œaction:”, β€œredirect:” or β€œredirectAction:” is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code.

Affected configurations

Vulners
Node
org.apache.struts\struts2Matchcore

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%