Summary
Excerpt |
---|
Double Forced double OGNL evaluation, when using evaluated on raw user input in tag 's attributesattributes, may lead to remote code execution. |
Who should read this | All Struts 2 developers and users |
---|---|
Impact of vulnerability | Possible Remote Code Execution vulnerability |
Maximum security rating | Important |
Recommendation | Always validate incoming parameters' values when re-assigning them to certain Struts' tags attributes. Don't use %{...} syntax in tag attributes unless you have a valid use-case. Alternatively upgrade to Struts 2.3.27 |
Affected Software | Struts 2.0.0 - Struts Struts 2.3.24.1 |
Reporter | Romain Gaucher rgaucher at coverity dot com - Coverity |
CVE Identifier | CVE-2016-0785 |
...