2.1.6
15 years ago
15 years ago
Known vulnerabilities in the com.opensymphony:xwork-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors. | [2.1.5,2.1.6] |
com.opensymphony:xwork-core is a command-pattern framework that is used to power WebWork as well as other applications. Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice. How to fix Arbitrary Code Execution? There is no fixed version for | [2.1.4,) |
com.opensymphony:xwork-core is a command-pattern framework that is used to power WebWork as well as other applications. Affected versions of this package are vulnerable to Denial of Service (DoS). It allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression. How to fix Denial of Service (DoS)? There is no fixed version for | [0,) |
Apache Struts 2 before 2.3.14.1 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. | [2.1.4,2.1.6) |
OGNL provides, among other features, extensive expression evaluation capabilities. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject a malicious expression in any exposed string variable for further evaluation. | [2.1.4,2.1.6) |
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. | [2.1.4,2.1.6) |
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. | [2.1.4,2.1.6] |
com.opensymphony:xwork-core is a command-pattern framework that is used to power WebWork as well as other applications. Affected versions of this package are vulnerable to multiple Cross-site Scripting (XSS) vulnerabilities allowing remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an How to fix Cross-site Scripting (XSS)? There is no fixed version for | [0,) |
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504. | [2.1.4,2.1.6) |