vendor:
Struts2
by:
hook-s3c
8.1
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: Struts2
Affected Version From: Struts 2.3.5 - Struts 2.3.31, Struts 2.5 - Struts 2.5.10
Affected Version To: Struts 2.3.5 - Struts 2.3.31, Struts 2.5 - Struts 2.5.10
Patch Exists: YES
Related CWE: CVE-2018-11776
CPE: a:apache:struts:2.3.5
Other Scripts:
N/A
Platforms Tested: Linux, Windows, Mac
2018
Struts2 Remote Code Execution Vulnerability
Struts2 Remote Code Execution Vulnerability is a vulnerability in Apache Struts2 which allows an attacker to execute arbitrary code on the server. This exploit uses a malicious OGNL expression to execute arbitrary commands on the server. The exploit is triggered when the vulnerable application receives a malicious request containing the malicious OGNL expression.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to the latest version of Apache Struts2. Additionally, the application should be configured to use the latest security patches and should be regularly monitored for any suspicious activity.