Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.
References
Link Resource
http://www.securityfocus.com/bid/91277 Third Party Advisory VDB Entry
https://security.netapp.com/advisory/ntap-20180629-0004/ Third Party Advisory
https://struts.apache.org/docs/s2-036.html Mitigation Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2017-10-16T16:00:00

Updated: 2018-06-30T09:57:01

Reserved: 2016-05-02T00:00:00


Link: CVE-2016-4461

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-10-16T16:29:00.607

Modified: 2019-05-01T20:17:13.647


Link: CVE-2016-4461

JSON object: View

cve-icon Redhat Information

No data.

CWE