Description
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
Remediation
References
http://issues.apache.org/struts/browse/WW-2692
http://secunia.com/advisories/32497
http://fisheye6.atlassian.com/cru/CR-9/
http://secunia.com/advisories/32495
http://jira.opensymphony.com/browse/XW-641
http://struts.apache.org/2.x/docs/s2-003.html
http://www.vupen.com/english/advisories/2008/3003
http://www.securityfocus.com/bid/32101
http://osvdb.org/49732
http://www.vupen.com/english/advisories/2008/3004
https://exchange.xforce.ibmcloud.com/vulnerabilities/46328
Related Vulnerabilities
CVE-2015-0250 Vulnerability in maven package org.apache.xmlgraphics:batik-dom
CVE-2023-36477 Vulnerability in maven package org.xwiki.platform:xwiki-platform-ckeditor-ui
CVE-2023-0091 Vulnerability in maven package org.keycloak:keycloak-core
CVE-2023-36479 Vulnerability in maven package org.eclipse.jetty.ee10:jetty-ee10-servlets
CVE-2012-1833 Vulnerability in maven package org.grails:grails-plugin-controllers