OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the '#'-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context objects. This behavior was already addressed in S2-003, but it turned out that the resulting fix based on whitelisting acceptable parameter names closed the vulnerability only partially.
{
"nvd_published_at": "2010-08-17T20:00:00Z",
"cwe_ids": [],
"github_reviewed_at": "2022-11-03T19:11:38Z",
"severity": "MODERATE",
"github_reviewed": true
}