Arbitrary Code Injection The advisory has been revoked - it doesn't affect any version of package org.apache.struts:struts-core Open this link in a new tab


    Threat Intelligence

    Exploit Maturity Mature
    EPSS 97.4% (100th percentile)
Expand this section
NVD
7.3 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGAPACHESTRUTS-30763
  • published 19 Oct 2015
  • disclosed 29 Apr 2014
  • credit Unknown

Amendment

This was deemed not a vulnerability.

Overview

org.apache.struts:struts-core is a free, open-source, MVC framework for creating Java web applications.

Affected versions of this package are vulnerable to Arbitrary Code Injection. Apache Struts 2: Incomplete fix for ClassLoader manipulation via ParametersInterceptor ParametersInterceptor in Apache Struts before 2.3.16.2 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.