|
|||
Rule General Information |
---|
Release Date: | 2018-09-25 | |
Rule Name: | Apache Struts OGNL Expressions DefaultActionMapper Code Execution Vulnerability (CVE-2013-2251) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Solaris, FreeBSD, Other Unix, Linux | |
Reference: | SecurityTrackerID:1029184 SecurityTrackerID:1032916 http://osvdb.org/98445 http://archiva.apache.org/security.html SecurityFocusBID:61189 SecurityFocusBID:64758 http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html |
|
Solutions |
---|
Upgrading to version 2.3.15.1 eliminates this vulnerability. |