Red Hat Bugzilla – Bug 986183
CVE-2013-2251 Apache Struts 2 arbitrary OGNL code execution via crafted parameters
Last modified: 2018-03-02 05:15:52 EST
The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with "action:" or "redirect:", followed by a desired navigational target expression. This mechanism was intended to help with attaching navigational information to buttons within forms. In Struts 2 before 2.3.15.1 the information following "action:", "redirect:" or "redirectAction:" is not properly sanitized. Since said information will be evaluated as OGNL expression against the value stack, this introduces the possibility to inject server side code. Upstream Advisory: http://struts.apache.org/release/2.3.x/docs/s2-016.html Upstream bug: https://issues.apache.org/jira/browse/WW-4140 Upstream commit: https://svn.apache.org/viewvc?view=revision&revision=r1503127
Statement: Not Vulnerable. This issue only affects struts 2, it does not affect the versions of struts as shipped with various Red Hat products.