9.8
CVE-2013-2251
- EPSS 94.23%
- Published 20.07.2013 03:37:30
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Data is provided by the National Vulnerability Database (NVD)
Fujitsu ≫ Interstage Business Process Manager Analytics Version12.0
Microsoft ≫ Windows Server 2003 Version-
Microsoft ≫ Windows Server 2008 Version-
Redhat ≫ Enterprise Linux Version >= 5.0 <= 6.10
Microsoft ≫ Windows Server 2008 Version-
Redhat ≫ Enterprise Linux Version >= 5.0 <= 6.10
Fujitsu ≫ Interstage Business Process Manager Analytics Version12.1
Microsoft ≫ Windows Server 2003 Version-
Microsoft ≫ Windows Server 2008 Version-
Microsoft ≫ Windows Server 2012 Version-
Oracle ≫ Solaris Version11
Redhat ≫ Enterprise Linux Version >= 5.0 <= 6.10
Microsoft ≫ Windows Server 2008 Version-
Microsoft ≫ Windows Server 2012 Version-
Oracle ≫ Solaris Version11
Redhat ≫ Enterprise Linux Version >= 5.0 <= 6.10
Fujitsu ≫ Gp7000f Firmware Version-
Fujitsu ≫ Primepower Firmware Version-
Fujitsu ≫ Gp-s Firmware Version-
Fujitsu ≫ Primergy Firmware Version-
Fujitsu ≫ Gp5000 Firmware Version-
Fujitsu ≫ Sparc Firmware Version-
Oracle ≫ Siebel Apps - E-billing Version6.1
Oracle ≫ Siebel Apps - E-billing Version6.1.1
Oracle ≫ Siebel Apps - E-billing Version6.2
25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Apache Struts Improper Input Validation Vulnerability
VulnerabilityApache Struts allows remote attackers to execute arbitrary Object-Graph Navigation Language (OGNL) expressions.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.23% | 0.999 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.