First published: Fri Dec 11 2020(Updated: )
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts 2 | ||
Apache Struts 2 | >=2.0.0<2.5.30 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.3.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.4.0 | |
Oracle Communications Diameter Intelligence Hub | =8.0.0 | |
Oracle Communications Diameter Intelligence Hub | =8.1.0 | |
Oracle Communications Diameter Intelligence Hub | =8.2.0 | |
Oracle Communications Diameter Intelligence Hub | =8.2.3 | |
Oracle Communications Policy Management | =12.5.0 | |
Oracle Communications Pricing Design Center | =12.0.0.3.0 | |
oracle financial services data integration hub | =8.0.3 | |
oracle financial services data integration hub | =8.0.6 | |
Oracle Hospitality OPERA | =5.6 | |
MySQL Enterprise Monitor | =8.0.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Apache Struts vulnerability is CVE-2020-17530.
The severity of CVE-2020-17530 is critical with a score of 9.8.
The affected software includes Apache Struts 2.0.0 - Struts 2.5.30, Oracle Business Intelligence 12.2.1.3.0 and 12.2.1.4.0, Oracle Communications Diameter Intelligence Hub 8.0.0, 8.1.0, 8.2.0, and 8.2.3, Oracle Communications Policy Management 12.5.0, Oracle Communications Pricing Design Center 12.0.0.3.0, Oracle Financial Services Data Integration Hub 8.0.3 and 8.0.6, Oracle Hospitality Opera 5.6, and Oracle MySQL Enterprise Monitor 8.0.23.
CVE-2020-17530 is a vulnerability in Apache Struts that allows for remote code execution through forced OGNL evaluation.
To fix CVE-2020-17530, it is recommended to update to a patched version of Apache Struts or apply necessary security patches provided by the affected software vendors.