Search Results (Refine Search)
- CPE Product Version: cpe:/a:apache:struts:2.0.11.1
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2012-0394 |
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself. Published: January 08, 2012; 10:55:01 AM -0500 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2012-0392 |
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. Published: January 08, 2012; 10:55:01 AM -0500 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2012-0391 |
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. Published: January 08, 2012; 10:55:01 AM -0500 |
V3.x:(not available) V2.0: 9.3 HIGH |
CVE-2011-2087 |
Multiple cross-site scripting (XSS) vulnerabilities in component handlers in the javatemplates (aka Java Templates) plugin in Apache Struts 2.x before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via an arbitrary parameter value to a .action URI, related to improper handling of value attributes in (1) FileHandler.java, (2) HiddenHandler.java, (3) PasswordHandler.java, (4) RadioHandler.java, (5) ResetHandler.java, (6) SelectHandler.java, (7) SubmitHandler.java, and (8) TextFieldHandler.java. Published: May 13, 2011; 1:05:45 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2011-1772 |
Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element. Published: May 13, 2011; 1:05:44 PM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
CVE-2010-1870 |
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504. Published: August 17, 2010; 4:00:03 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2008-6505 |
Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x. Published: March 23, 2009; 10:19:12 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-2008-6504 |
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character. Published: March 23, 2009; 10:19:12 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |