Red Hat Bugzilla – Bug 773159
CVE-2012-0391 struts: User input is evaluated as an OGNL expression when there's a conversion error
Last modified: 2018-03-01 15:55:10 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-0391 to the following vulnerability: Name: CVE-2012-0391 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0391 Assigned: 20120108 Reference: http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html Reference: http://www.exploit-db.com/exploits/18329 Reference: https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt Reference: http://struts.apache.org/2.x/docs/s2-008.html Reference: http://struts.apache.org/2.x/docs/version-notes-2311.html Reference: https://issues.apache.org/jira/browse/WW-3668 Reference: http://secunia.com/advisories/47393 The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
This issue only affects struts 2.
Statement: Not Vulnerable. This issue does not affect the versions of struts as shipped with various Red Hat products.