First published: Mon May 27 2013(Updated: )
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Struts | <2.3.14.3 | 2.3.14.3 |
Apache Struts | >=2.0.0<2.3.14.1 | |
Apache Struts2-showcase | >=2.0.0<=2.3.13 | |
maven/org.apache.struts:struts2-core | <2.3.14.3 | 2.3.14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.