CVE-2020-17530 – Apache Struts Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-17530
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. Una evaluación OGNL forzada, cuando se evalúa según la entrada del usuario sin procesar en los atributos de la etiqueta, puede conllevar a una ejecución de código remota. Software afectado: Apache Struts versión 2.0.0 - Struts versión 2.5.25 The Apache Struts framework, when forced, performs double evaluation of attribute values assigned to certain tags attributes such as id. It is therefore possible to pass in a value to Struts that will be evaluated again when a tag's attributes are rendered. • https://github.com/wuzuowei/CVE-2020-17530 https://github.com/ka1n4t/CVE-2020-17530 https://github.com/Al1ex/CVE-2020-17530 https://github.com/phil-fly/CVE-2020-17530 https://github.com/CyborgSecurity/CVE-2020-17530 https://github.com/fengziHK/CVE-2020-17530-strust2-061 https://github.com/uzzzval/CVE-2020-17530 https://github.com/nth347/CVE-2020-17530 https://github.com/secpool2000/CVE-2020-17530 https://github.com/keyuan15/CVE-2020-17530 https://github.com/kil • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •
CVE-2019-0233
https://notcve.org/view.php?id=CVE-2019-0233
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload. Una anulación del permiso de acceso en Apache Struts versiones 2.0.0 hasta 2.5.20, puede causar una Denegación de Servicio al llevar a cabo una carga de archivo • https://cwiki.apache.org/confluence/display/ww/s2-060 https://launchpad.support.sap.com/#/notes/2982840 https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2021.html • CWE-281: Improper Preservation of Permissions •
CVE-2019-0230 – Apache Struts 2.5.20 - Double OGNL evaluation
https://notcve.org/view.php?id=CVE-2019-0230
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Apache Struts versiones 2.0.0 hasta 2.5.20, forzó una evaluación OGNL doble, cuando se evaluaba en la entrada del usuario sin procesar en los atributos de la etiqueta, puede conllevar a una ejecución de código remota The Apache Struts framework, when forced, performs double evaluation of attribute values assigned to certain tags attributes such as id. It is therefore possible to pass in a value to Struts that will be evaluated again when a tag's attributes are rendered. With a carefully crafted request, this can lead to remote code execution. This vulnerability is application dependant. • https://www.exploit-db.com/exploits/49068 https://github.com/PrinceFPF/CVE-2019-0230 https://github.com/BH2UOL/CVE-2019-0230 https://github.com/ramoncjs3/CVE-2019-0230 https://github.com/Al1ex/CVE-2019-0230 https://github.com/fengziHK/CVE-2019-0230 https://github.com/f8al/CVE-2019-0230-PoC http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html http • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •
CVE-2015-2992
https://notcve.org/view.php?id=CVE-2015-2992
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability. Apache Struts versiones anteriores a 2.3.20, presenta una vulnerabilidad de tipo cross-site scripting (XSS) • http://jvn.jp/en/jp/JVN88408929/index.html http://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000124.html http://www.securityfocus.com/bid/76624 https://security.netapp.com/advisory/ntap-20200330-0001 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-1592 – Apache Struts 2.0 - 'XSLTResult.java' Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2012-1592
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files. Se presenta un problema de ejecución de código local en Apache Struts2 cuando se procesan archivos XSLT malformados, lo que podría permitir a un usuario malicioso cargar y ejecutar archivos arbitrarios. • https://www.exploit-db.com/exploits/37009 http://www.openwall.com/lists/oss-security/2012/03/28/12 https://access.redhat.com/security/cve/cve-2012-1592 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1592 https://lists.apache.org/thread.html/r348ed455a140273c40b974f0615dee692f7c9b26c6de2118b4280ef2%40%3Cissues.struts.apache.org%3E https://lists.apache.org/thread.html/r593ebb2f4c95b064e6901fd273eff256c493db952bdb484395948ffc%40%3Cissues.struts.apache.org%3E https://lists.apache.org/thread.html/r93c4e3f6cb138cd117c739714f07 • CWE-434: Unrestricted Upload of File with Dangerous Type •