⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..
CVE-2020-17530 — Expression Language Injection in Apache Struts
Severity
9.8CRITICALNVD
EPSS
94.4%
top 0.03%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedDec 11
KEV addedNov 3
Latest updateApr 15
KEV dueMay 3
CISA Required Action: Apply updates per vendor instructions.
Description
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages9 packages
Patches
🔴Vulnerability Details
5CVEList▶
CVE-2020-17530: Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution↗2020-12-11
💥Exploits & PoCs
2Nuclei▶
Apache Struts 2.0.0-2.5.25 - Remote Code Execution
Nuclei▶
Apache Struts2 S2-062 - Remote Code Execution
🔍Detection Rules
2📋Vendor Advisories
8Oracle
▶
Red Hat▶
Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.↗2022-04-12
Oracle▶
Oracle Oracle Fusion Middleware Risk Matrix: Installation (Apache Struts2) — CVE-2020-17530↗2022-01-15
Oracle▶
Oracle Oracle Communications Risk Matrix: Enterprise Policy (Apache Struts2) — CVE-2020-17530↗2021-10-15