Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h4v9-jf2r-9h6m | Cross-Site Request Forgery in Apache Struts |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T13:03:27.319Z
Reserved: 2014-10-03T00:00:00
Link: CVE-2014-7809
No data.
Status : Deferred
Published: 2014-12-10T15:59:01.347
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-7809
OpenCVE Enrichment
No data.
Github GHSA