Arbitrary Code Injection The advisory has been revoked - it doesn't affect any version of package org.apache.struts:struts-core Open this link in a new tab
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESTRUTS-30763
- published 19 Oct 2015
- disclosed 29 Apr 2014
- credit Unknown
Introduced: 29 Apr 2014
CVE-2014-0112 Open this link in a new tabAmendment
This was deemed not a vulnerability.
Overview
org.apache.struts:struts-core is a free, open-source, MVC framework for creating Java web applications.
Affected versions of this package are vulnerable to Arbitrary Code Injection. Apache Struts 2: Incomplete fix for ClassLoader manipulation via ParametersInterceptor ParametersInterceptor in Apache Struts before 2.3.16.2 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.