Skip to content

Arbitrary code execution in Apache Struts

High severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Dec 27, 2023

Package

maven org.apache.struts.xwork:xwork-core (Maven)

Affected versions

>= 2.0.0, < 2.3.14.2

Patched versions

2.3.14.2
maven org.apache.struts:struts2-core (Maven)
>= 2.0.0, < 2.3.14.2
2.3.14.2

Description

Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.

References

Published by the National Vulnerability Database Jul 10, 2013
Published to the GitHub Advisory Database May 14, 2022
Reviewed Nov 3, 2022
Last updated Dec 27, 2023

Severity

High

EPSS score

1.858%
(89th percentile)

Weaknesses

CVE ID

CVE-2013-1966

GHSA ID

GHSA-737w-mh58-cxjp

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.