发布时间: 2022年7月30日
修改时间: 2022年7月30日
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
NVD | openEuler | |
---|---|---|
CVSS评分 | 10.0 | 10.0 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | ||
User Interaction | ||
Scope | ||
Confidentiality | ||
Integrity | ||
Availability |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1705 | Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. | 2022年7月30日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | struts | Unaffected |
KY3.4-5 | struts | Unaffected |
KY3.5.1 | struts | Unaffected |