GHSA-j68f-8h6p-9h5q

Suggest an improvement
Source
https://github.com/advisories/GHSA-j68f-8h6p-9h5q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-j68f-8h6p-9h5q/GHSA-j68f-8h6p-9h5q.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-j68f-8h6p-9h5q
Aliases
  • CVE-2011-3923
Published
2022-04-22T00:24:08Z
Modified
2024-02-16T08:24:48.651940Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Struts ParameterInterceptor vulnerability allows remote command execution
Details

Regular expression in ParametersInterceptor matches top['foo'](0) as a valid expression, which OGNL treats as (top['foo'])(0) and evaluates the value of 'foo' action parameter as an OGNL expression. This lets malicious users put arbitrary OGNL statements into any String variable exposed by an action and have it evaluated as an OGNL expression and since OGNL statement is in HTTP parameter value attacker can use blacklisted characters (e.g. #) to disable method execution and execute arbitrary methods, bypassing the ParametersInterceptor and OGNL library protections.

Database specific
{
    "nvd_published_at": "2019-11-01T14:15:00Z",
    "cwe_ids": [
        "CWE-732",
        "CWE-94"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-11-03T23:46:44Z"
}
References

Affected packages

Maven / org.apache.struts:struts2-core

Package

Name
org.apache.struts:struts2-core
View open source insights on deps.dev
Purl
pkg:maven/org.apache.struts/struts2-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.0.0
Fixed
2.3.1.2

Affected versions

2.*

2.0.5
2.0.6
2.0.8
2.0.9
2.0.11
2.0.11.1
2.0.11.2
2.0.12
2.0.14
2.1.2
2.1.6
2.1.8
2.1.8.1
2.2.1
2.2.1.1
2.2.3
2.2.3.1
2.3.1
2.3.1.1