First published: Tue Jun 07 2016(Updated: )
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-core | >=2.3.25<2.3.28.1 | 2.3.28.1 |
maven/org.apache.struts:struts2-core | >=2.3.21<2.3.24.3 | 2.3.24.3 |
maven/org.apache.struts:struts2-core | >=2.3.19<2.3.20.3 | 2.3.20.3 |
Apache Struts | =2.3.20 | |
Apache Struts | =2.3.20.1 | |
Apache Struts | =2.3.24 | |
Apache Struts | =2.3.24.1 | |
Apache Struts | =2.3.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.