Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-0230
Severity
9.8CRITICAL
EPSS
93.7%
top 0.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 14
Latest updateDec 2
Description
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages7 packages
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
2Nuclei▶
Apache Struts <=2.5.20 - Remote Code Execution
🔍Detection Rules
1Suricata▶
ET WEB_SPECIFIC_APPS Possible Apache Struts OGNL Remote Code Execution Inbound (CVE-2019-0230)↗2021-07-24
📋Vendor Advisories
2🕵️Threat Intelligence
3💬Community
1Bugzilla▶
CVE-2019-0230 struts2: possible RCE due to forced double OGNL evaluation when evaluated on raw user input in tag attributes↗2020-08-18