The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2022-04-12T15:25:11
Updated: 2024-08-03T23:10:30.193Z
Reserved: 2021-04-26T00:00:00
Link: CVE-2021-31805
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-04-12T16:15:08.133
Modified: 2024-11-21T06:06:15.697
Link: CVE-2021-31805
Redhat