Arbitrary Code Execution The advisory has been revoked - it doesn't affect any version of package org.apache.struts:struts2-core  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Mature
EPSS
97.18% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHESTRUTS-30054
  • published25 Apr 2014
  • disclosed25 Apr 2014
  • creditUnknown

Introduced: 25 Apr 2014

CVE-2014-0112  (opens in a new tab)
CWE-264  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language.

Affected versions of this package are vulnerable to Arbitrary Code Execution. ParametersInterceptor does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.