CVE-2012-0838
02.03.2012, 22:55
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | struts | 2.0.0 ≤ 𝑥 ≤ 2.2.3 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References