Apache Struts Code injection due to conversion error
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 27, 2023
Description
Published by the National Vulnerability Database
Mar 2, 2012
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Nov 3, 2022
Last updated
Dec 27, 2023
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
References