First published: Mon May 27 2013(Updated: )
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts.xwork:xwork-core | >=2.0.0<2.3.14.2 | 2.3.14.2 |
maven/org.apache.struts:struts2-core | >=2.0.0<2.3.14.2 | 2.3.14.2 |
Apache Struts | >=2.0.0<2.3.14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1966 has a high severity rating due to its ability to allow remote code execution.
To fix CVE-2013-1966, upgrade the affected Apache Struts versions to at least 2.3.14.2.
CVE-2013-1966 affects Apache Struts versions from 2.0.0 up to 2.3.14.1.
CVE-2013-1966 is a remote code execution vulnerability that allows attackers to execute arbitrary OGNL code.
CVE-2013-1966 affects the s:url and s:a tags in Apache Struts when used with the includeParams attribute.