|
|||
Rule General Information |
---|
Release Date: | 2014-03-11 | |
Rule Name: | WEB-SERVER Apache Struts URL and Anchor Tag Includeparams OGNL Command Execution Vulnerability (CVE-2013-2115) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Solaris, Other Unix, FreeBSD, Linux | |
Reference: | SecurityFocusBID:60167 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: http://struts.apache.org/development/2.x/docs/s2-014.html |