// For flags

CVE-2010-1870

Apache Struts < 2.2.0 - Remote Command Execution

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.

La capacidad OGNL extensive expression evaluation en XWork de Struts v2.0.0 hasta v2.1.8.1, como el usado en Atlassian Fisheye, Crucible,y posiblemente otros productos, usa una lista blanca permisiva, la cual permite a atacantes remotos modificar los objetos del contexto del lado del servidor y evitar el mecanismo de protección "#" en ParameterInterceptors a través de (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, y posiblemente otras variables de contexto OGNL, una vulnerabilidad diferente de CVE-2008-6504.

Multiple Cisco products include an implementation of the Apache Struts 2 component that is affected by a remote command execution vulnerability identified by Apache with Common Vulnerabilities and Exposures ID CVE-2010-1870. The vulnerability is due to insufficient sanitization on user-supplied input in the XWorks component of the affected software. The component uses the ParameterInterceptors directive to parse the Object-Graph Navigation Language (OGNL) expressions that are implemented via a whitelist feature. An attacker could exploit this vulnerability by sending crafted requests that contain OGNL expressions to an affected system. An exploit could allow the attacker to execute arbitrary code on the targeted system. Cisco has released free software updates that address this vulnerability for all the affected products except Cisco Business Edition 3000 Series. Customers using Cisco Business Edition 3000 Series should contact their Cisco representative for available options.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-05-10 CVE Reserved
  • 2010-07-14 First Exploit
  • 2010-08-17 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.0
Search vendor "Apache" for product "Struts" and version "2.0.0"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.1
Search vendor "Apache" for product "Struts" and version "2.0.1"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.2
Search vendor "Apache" for product "Struts" and version "2.0.2"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.3
Search vendor "Apache" for product "Struts" and version "2.0.3"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.4
Search vendor "Apache" for product "Struts" and version "2.0.4"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.5
Search vendor "Apache" for product "Struts" and version "2.0.5"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.6
Search vendor "Apache" for product "Struts" and version "2.0.6"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.7
Search vendor "Apache" for product "Struts" and version "2.0.7"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.8
Search vendor "Apache" for product "Struts" and version "2.0.8"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.9
Search vendor "Apache" for product "Struts" and version "2.0.9"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.10
Search vendor "Apache" for product "Struts" and version "2.0.10"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.11
Search vendor "Apache" for product "Struts" and version "2.0.11"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.11.1
Search vendor "Apache" for product "Struts" and version "2.0.11.1"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.11.2
Search vendor "Apache" for product "Struts" and version "2.0.11.2"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.12
Search vendor "Apache" for product "Struts" and version "2.0.12"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.13
Search vendor "Apache" for product "Struts" and version "2.0.13"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.0.14
Search vendor "Apache" for product "Struts" and version "2.0.14"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.0
Search vendor "Apache" for product "Struts" and version "2.1.0"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.1
Search vendor "Apache" for product "Struts" and version "2.1.1"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.2
Search vendor "Apache" for product "Struts" and version "2.1.2"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.3
Search vendor "Apache" for product "Struts" and version "2.1.3"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.4
Search vendor "Apache" for product "Struts" and version "2.1.4"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.5
Search vendor "Apache" for product "Struts" and version "2.1.5"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.6
Search vendor "Apache" for product "Struts" and version "2.1.6"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.8
Search vendor "Apache" for product "Struts" and version "2.1.8"
-
Affected
Apache
Search vendor "Apache"
Struts
Search vendor "Apache" for product "Struts"
2.1.8.1
Search vendor "Apache" for product "Struts" and version "2.1.8.1"
-
Affected