Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-20"
],
"github_reviewed_at": "2022-11-03T23:00:54Z",
"nvd_published_at": "2012-03-02T22:55:00Z",
"severity": "HIGH"
}