Description
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
Remediation
References
http://struts.apache.org/docs/s2-029.html
http://www.securitytracker.com/id/1035271
http://www.securityfocus.com/bid/85066
Related Vulnerabilities
CVE-2014-7809 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2021-43571 Vulnerability in npm package starkbank-ecdsa
CVE-2023-31098 Vulnerability in maven package org.apache.inlong:manager-pojo
CVE-2022-31167 Vulnerability in maven package org.xwiki.platform:xwiki-platform-security