Summary
Excerpt |
---|
User input is evaluated as an OGNL expression when there's a conversion error |
Who should read this | All Struts 2 developers |
---|---|
Impact of vulnerability | Remote Code Execution |
Maximum security rating | Important |
Recommendation | Developers should either upgrade to Struts 2.2.3.1 or apply the configuration changes described below |
Affected Software | Struts 2.0.0 - Struts 2.2.3 |
Original JIRA Tickets | |
Reporter | Hideyuki Suzumi |
CVE Identifier | - |
Problem
User input is evaluated as an OGNL expression when there's a conversion error. This allows a malicious user to execute arbitrary code.
A more detailed description is found in the referenced JIRA ticket.
Solution
Upgrade to Struts 2.2.3.1.