Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
|
History
No history.
Information
Published : 2013-07-20 03:37
Updated : 2024-07-16 17:57
NVD link : CVE-2013-2251
Mitre link : CVE-2013-2251
CVE.ORG link : CVE-2013-2251
JSON object : View
Products Affected
microsoft
- windows_server_2003
- windows_server_2012
- windows_server_2008
fujitsu
- primergy
- interstage_business_process_manager_analytics
- primergy_firmware
- gp-s_firmware
- primepower_firmware
- gp7000f
- gp5000
- sparc
- gp-s
- gp5000_firmware
- gp7000f_firmware
- primepower
- sparc_firmware
oracle
- siebel_apps_-_e-billing
- solaris
apache
- struts
- archiva
redhat
- enterprise_linux
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')