First published: Tue Aug 17 2010(Updated: )
OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the '#'-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context objects. This behavior was already addressed in [S2-003](https://cwiki.apache.org/confluence/display/WW/S2-003), but it turned out that the resulting fix based on whitelisting acceptable parameter names closed the vulnerability only partially.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | =2.0.9 | |
Apache Struts | =2.0.12 | |
Apache Struts | =2.1.0 | |
Apache Struts | =2.0.0 | |
Apache Struts | =2.0.8 | |
Apache Struts | =2.0.7 | |
Apache Struts | =2.0.4 | |
Apache Struts | =2.1.8.1 | |
Apache Struts | =2.1.3 | |
Apache Struts | =2.1.2 | |
Apache Struts | =2.1.5 | |
Apache Struts | =2.0.1 | |
Apache Struts | =2.0.2 | |
Apache Struts | =2.1.8 | |
Apache Struts | =2.0.11.1 | |
Apache Struts | =2.0.3 | |
Apache Struts | =2.0.14 | |
Apache Struts | =2.0.11 | |
Apache Struts | =2.1.6 | |
Apache Struts | =2.0.5 | |
Apache Struts | =2.1.4 | |
Apache Struts | =2.0.11.2 | |
Apache Struts | =2.0.13 | |
Apache Struts | =2.1.1 | |
Apache Struts | =2.0.6 | |
Apache Struts | =2.0.10 | |
maven/org.apache.struts:struts2-core | <2.2.1 | 2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.