The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Oracle(2 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
WolfgangSesin | http://www.sesin.at | Source WolfgangSesin 1625197067676033026 | 2023/02/14 |
WolfgangSesin | https://www.sesin.at/2023/02/13/cve-2021-31805-oracle-hyper... | Source WolfgangSesin 1625197067676033026 | 2023/02/14 |
www_sesin_at | http://www.sesin.at | Source www_sesin_at 1625197073002860546 | 2023/02/14 |
www_sesin_at | https://www.sesin.at/2023/02/13/cve-2021-31805-oracle-hyper... | Source www_sesin_at 1625197073002860546 | 2023/02/14 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 120 |
cvetrends.com | 54 |
lists.astaro.com | 33 |
securityaffairs.co | 11 |
cwiki.apache.org | 7 |
ift.tt | 4 |
security.sios.com | 3 |
www.bleepingcomputer.com | 3 |
User | URL | Info Source |
---|---|---|
WolfgangSesin | sesin.at | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
Name | URL |
---|---|
YanMu2020/s2-062 | https://github.com/YanMu2020/s2-062 |
Wrin9/CVE-2021-31805 | https://github.com/Wrin9/CVE-2021-31805 |
aeyesec/CVE-2021-31805 | https://github.com/aeyesec/CVE-2021-31805 |
jax7sec/S2-062 | https://github.com/jax7sec/S2-062 |
Axx8/Struts2_S2-062_CVE-2021-31805 | https://github.com/Axx8/Struts2_S2-062_CVE-2021-31805 |
3SsFuck/CVE-2021-31805-POC | https://github.com/3SsFuck/CVE-2021-31805-POC |
Name | URL |
---|---|
YanMu2020/s2-062 | github.com |
Wrin9/CVE-2021-31805 | github.com |
aeyesec/CVE-2021-31805 | github.com |
jax7sec/S2-062 | github.com |
Axx8/Struts2_S2-062_CVE-2021-31805 | github.com |
3SsFuck/CVE-2021-31805-POC | github.com |