com.opensymphony:xwork-core@2.1.6 vulnerabilities
-
latest version
2.1.6
-
first published
15 years ago
-
latest version published
15 years ago
-
licenses detected
- [2.1.4,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the com.opensymphony:xwork-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors. |
[2.1.5,2.1.6]
|
com.opensymphony:xwork-core is a command-pattern framework that is used to power WebWork as well as other applications. Affected versions of this package are vulnerable to Arbitrary Code Execution. It allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice. How to fix Arbitrary Code Execution? There is no fixed version for |
[2.1.4,)
|
com.opensymphony:xwork-core is a command-pattern framework that is used to power WebWork as well as other applications. Affected versions of this package are vulnerable to Denial of Service (DoS). It allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression. How to fix Denial of Service (DoS)? There is no fixed version for |
[0,)
|
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. |
[2.1.4,2.1.6]
|
com.opensymphony:xwork-core is a command-pattern framework that is used to power WebWork as well as other applications. Affected versions of this package are vulnerable to multiple Cross-site Scripting (XSS) vulnerabilities allowing remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
|