First published: Fri Mar 02 2012(Updated: )
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts.xwork:xwork-core | <2.2.3.1 | 2.2.3.1 |
maven/org.apache.struts:struts2-core | <2.2.3.1 | 2.2.3.1 |
Apache Struts 2 | >=2.0.0<=2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0838 has a high severity rating due to the potential for remote code execution.
The vulnerability can be mitigated by upgrading Apache Struts to version 2.2.3.1 or later.
CVE-2012-0838 affects all versions of Apache Struts from 2.0.0 up to 2.2.3.
CVE-2012-0838 allows attackers to execute arbitrary code by exploiting OGNL expression evaluation during conversion errors.
Yes, there are known exploits that leverage the vulnerability to execute malicious code remotely.