Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • T ticket
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 1,809
    • Issues 1,809
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 0
    • Merge requests 0
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Packages & Registries
    • Packages & Registries
    • Package Registry
    • Infrastructure Registry
  • Analytics
    • Analytics
    • CI/CD
    • Repository
    • Value stream
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Administrator
  • ticket
  • Issues
  • #1746

Closed
Open
Created Mar 14, 2024 by Administrator@rootMaintainer

Findings for SCA, Critical, [TheRedHatter/javagoof:todolist-web-struts/pom.xml]:Remote Code Execution (RCE)

Created by: armorcodegithubpreprod[bot]

Findings for SCA, Critical, [TheRedHatter/javagoof:todolist-web-struts/pom.xml]:Remote Code Execution (RCE)

Component Details

  • Exploit Maturity: proof-of-concept
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >[2.0.0, 2.5.26)
  • Vulnerable Path: >null

Overview

org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). The vulnerability exists due to improper input validation when processing certain tag's attributes. The application performs double evaluation of the code if a developer applied forced OGNL evaluation by using the %{...} syntax. A remote attacker can send a specially crafted request to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

References

  • Apache Security Advisory
  • GitHub Commit
  • PoC
  • PoC

Snyk Project Status: Active



Component Details

  • Exploit Maturity: mature
  • Vulnerable Package: -
  • Current Version: -
  • Vulnerable Version(s): >[2.0.0, 2.5.22)
  • Vulnerable Path: >null

Overview

org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). Forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.

References

  • Exploit
  • Proof Of Concept
  • Security Bulletin

Snyk Project Status: Active



Assignee
Assign to
Time tracking