Improper Input Validation Affecting org.apache.struts:struts2-core package, versions [2.0.0, 2.2.3.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
25.42% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHESTRUTS-30042
  • published17 Jun 2014
  • disclosed5 Aug 2011
  • creditUnknown

Introduced: 5 Aug 2011

CVE-2012-0838  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade org.apache.struts:struts2-core to version 2.2.3.1 or higher.

Overview

org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language.

Affected versions of this package are vulnerable to Improper Input Validation. It evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.

CVSS Scores

version 3.1