CVE-2012-0838
02.03.2012, 22:55
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.Enginsight
Vendor | Product | Version |
---|---|---|
apache | struts | 2.0.0 ≤ 𝑥 ≤ 2.2.3 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References