First published: Mon Sep 14 2020(Updated: )
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts | >=2.0.0<=2.5.20 | |
Oracle Communications Policy Management | =12.5.0 | |
Oracle Financial Services Data Integration Hub | =8.0.3 | |
Oracle Financial Services Data Integration Hub | =8.0.6 | |
Oracle Financial Services Market Risk Measurement and Management | =8.0.6 | |
IBM Cognos Analytics | <=8.0.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0230 is a vulnerability in Apache Struts version 2.0.0 to 2.5.20 that allows for forced double OGNL evaluation, potentially leading to remote code execution.
CVE-2019-0230 has a severity rating of 9.8, which is considered critical.
CVE-2019-0230 affects Apache Struts versions 2.0.0 to 2.5.20, Oracle Communications Policy Management version 12.5.0, Oracle Financial Services Data Integration Hub versions 8.0.3 and 8.0.6, Oracle Financial Services Market Risk Measurement and Management version 8.0.6, and Oracle MySQL Enterprise Monitor up to version 8.0.23.
To fix CVE-2019-0230, it is recommended to update to a patched version of Apache Struts or the affected software.
More information about CVE-2019-0230 can be found at the following references: [1] http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html [2] http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html [3] https://cwiki.apache.org/confluence/display/ww/s2-059