Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN43969166/index.html | Third Party Advisory |
http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2022/04/12/6 | Mailing List Third Party Advisory |
https://cwiki.apache.org/confluence/display/WW/S2-061 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210115-0005/ | Patch Third Party Advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuApr2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: apache
Published: 2020-12-11T01:11:04
Updated: 2022-04-19T23:21:54
Reserved: 2020-08-12T00:00:00
Link: CVE-2020-17530
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-11T02:15:10.883
Modified: 2022-06-03T16:38:02.030
Link: CVE-2020-17530
JSON object: View
Redhat Information
No data.
CWE