Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Struts
(Apache)Repositories | https://github.com/kawasima/struts1-forever |
#Vulnerabilities | 84 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-04-12 | CVE-2021-31805 | The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation. | Struts | 9.8 | ||
2020-12-11 | CVE-2020-17530 | Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. | Struts, Business_intelligence, Communications_diameter_intelligence_hub, Communications_policy_management, Communications_pricing_design_center, Financial_services_data_integration_hub, Hospitality_opera_5, Mysql_enterprise_monitor | 9.8 | ||
2020-09-14 | CVE-2019-0233 | An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload. | Struts, Communications_policy_management, Financial_services_data_integration_hub, Financial_services_market_risk_measurement_and_management, Mysql_enterprise_monitor | 7.5 | ||
2012-01-08 | CVE-2012-0392 | The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. | Struts | N/A | ||
2020-02-27 | CVE-2015-2992 | Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability. | Struts | 6.1 | ||
2010-08-17 | CVE-2010-1870 | The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9)... | Struts | N/A | ||
2016-07-04 | CVE-2016-1182 | ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899. | Struts | 8.2 | ||
2016-07-04 | CVE-2016-1181 | ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899. | Struts, Banking_platform, Portal | 8.1 | ||
2017-07-10 | CVE-2017-9791 | The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. | Struts | N/A | ||
2016-04-12 | CVE-2016-0785 | Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. | Struts | 8.8 |