摘要:
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
安全等级: Low
公告ID: KylinSec-SA-2022-1705
发布日期: 2022年7月30日
关联CVE: CVE-2012-0838
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2012-0838 | KY3.4-4A | struts | Unaffected |
CVE-2012-0838 | KY3.4-5 | struts | Unaffected |
CVE-2012-0838 | KY3.5.1 | struts | Unaffected |