CVE-2012-0838Improper Input Validation in Apache Struts

Severity
10.0CRITICALNVD
EPSS
11.1%
top 6.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 2
Latest updateMay 14

Description

Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

NVDapache/struts2.0.02.2.3

🔴Vulnerability Details

3
GHSA
Apache Struts Code injection due to conversion error2022-05-14
OSV
Apache Struts Code injection due to conversion error2022-05-14
CVEList
CVE-2012-0838: Apache Struts 2 before 22012-03-02

📋Vendor Advisories

1
Red Hat
Struts2: Certain strings evaluated as OGNL expressions, leading to run-time data modification or arbitrary code execution2011-08-05

💬Community

1
Bugzilla
CVE-2012-0838 Struts2: Certain strings evaluated as OGNL expressions, leading to run-time data modification or arbitrary code execution2012-03-05
CVE-2012-0838 — Improper Input Validation in Apache | cvebase