Apache Struts forced double OGNL evaluation
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Apr 23, 2025
Package
Affected versions
>= 2.0.0, < 2.3.29
Patched versions
2.3.29
Description
Published by the National Vulnerability Database
Oct 16, 2017
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Apr 23, 2025
Last updated
Apr 23, 2025
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.
References