Arbitrary Code Injection The advisory has been revoked - it doesn't affect any version of package org.apache.struts:struts-core  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Mature
EPSS
97.18% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHESTRUTS-30763
  • published19 Oct 2015
  • disclosed29 Apr 2014
  • creditUnknown

Introduced: 29 Apr 2014

CVE-2014-0112  (opens in a new tab)
CWE-94  (opens in a new tab)

Amendment

This was deemed not a vulnerability.

Overview

org.apache.struts:struts-core is a free, open-source, MVC framework for creating Java web applications.

Affected versions of this package are vulnerable to Arbitrary Code Injection. Apache Struts 2: Incomplete fix for ClassLoader manipulation via ParametersInterceptor ParametersInterceptor in Apache Struts before 2.3.16.2 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.