9.8

CVE-2013-2251

Warning
Exploit

Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.

Data is provided by the National Vulnerability Database (NVD)
ApacheArchiva Version >= 1.3 < 1.3.8
ApacheArchiva Version1.2 Update-
ApacheArchiva Version1.2.2
ApacheStruts Version >= 2.0.0 <= 2.3.15
FujitsuInterstage Business Process Manager Analytics Version12.0
   MicrosoftWindows Server 2003 Version-
   MicrosoftWindows Server 2008 Version-
   RedhatEnterprise Linux Version >= 5.0 <= 6.10
FujitsuInterstage Business Process Manager Analytics Version12.1
   MicrosoftWindows Server 2003 Version-
   MicrosoftWindows Server 2008 Version-
   MicrosoftWindows Server 2012 Version-
   OracleSolaris Version11
   RedhatEnterprise Linux Version >= 5.0 <= 6.10
FujitsuGp7000f Firmware Version-
   FujitsuGp7000f Version-
FujitsuPrimepower Firmware Version-
   FujitsuPrimepower Version-
FujitsuGp-s Firmware Version-
   FujitsuGp-s Version-
FujitsuPrimergy Firmware Version-
   FujitsuPrimergy Version-
FujitsuGp5000 Firmware Version-
   FujitsuGp5000 Version-
FujitsuSparc Firmware Version-
   FujitsuSparc Version-
OracleSiebel Apps - E-billing Version6.1.1

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Apache Struts Improper Input Validation Vulnerability

Vulnerability

Apache Struts allows remote attackers to execute arbitrary Object-Graph Navigation Language (OGNL) expressions.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.23% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

http://www.securityfocus.com/bid/64758
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id/1029184
Third Party Advisory
Broken Link
VDB Entry
http://cxsecurity.com/issue/WLB-2014010087
Third Party Advisory
Exploit
http://seclists.org/fulldisclosure/2013/Oct/96
Third Party Advisory
Exploit
Mailing List
http://seclists.org/oss-sec/2014/q1/89
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/61189
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id/1032916
Third Party Advisory
Broken Link
VDB Entry