CVE-2013-2135

high

Description

Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.

References

https://cwiki.apache.org/confluence/display/WW/S2-015

http://www.securityfocus.com/bid/64758

http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html

http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html

http://struts.apache.org/development/2.x/docs/s2-015.html

Details

Source: Mitre, NVD

Published: 2013-07-16

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High