Skip to content

Code injection in Apache Struts

High severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Dec 28, 2023

Package

maven org.apache.struts:struts2-core (Maven)

Affected versions

< 2.3.15.1

Patched versions

2.3.15.1

Description

The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with "action:" or "redirect:", followed by a desired navigational target expression. This mechanism was intended to help with attaching navigational information to buttons within forms.

In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code.

References

Published by the National Vulnerability Database Jul 20, 2013
Published to the GitHub Advisory Database May 13, 2022
Reviewed Nov 3, 2022
Last updated Dec 28, 2023

Severity

High

EPSS score

97.127%
(100th percentile)

Weaknesses

CVE ID

CVE-2013-2251

GHSA ID

GHSA-47qp-8v9g-39hp

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.