Description
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
Remediation
References
http://struts.apache.org/docs/s2-029.html
http://www.securitytracker.com/id/1035271
http://www.securityfocus.com/bid/85066
Related Vulnerabilities
CVE-2017-4972 Vulnerability in maven package org.cloudfoundry.identity:cloudfoundry-identity-server
CVE-2023-40343 Vulnerability in maven package io.jenkins.plugins:tuleap-oauth
CVE-2021-21696 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-49374 Vulnerability in maven package com.jfinal:jfinal
CVE-2018-11087 Vulnerability in maven package com.rabbitmq:amqp-client