First published: Sun Jan 08 2012(Updated: )
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | >=2.0.0<2.3.1 | |
maven/org.apache.struts.xwork:xwork-core | <2.2.3.1 | 2.2.3.1 |
maven/org.apache.struts:struts2-core | <2.2.3.1 | 2.2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.