Search for packages
| purl | pkg:maven/org.apache.struts/struts2-struts1-plugin@2.3.36 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-79j9-v8gz-rfax
Aliases: CVE-2020-17530 GHSA-jc35-q369-45pv |
Remote code execution in Apache Struts Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. | There are no reported fixed by versions. |
|
VCID-gfxq-vtry-bqgg
Aliases: CVE-2023-50164 GHSA-2j39-qcjm-428w |
Files or Directories Accessible to External Parties An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. | There are no reported fixed by versions. |
|
VCID-hgj2-vqzn-gyeb
Aliases: CVE-2021-31805 GHSA-v8j6-6c2r-r27c |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation. | There are no reported fixed by versions. |
|
VCID-hpm1-euf1-vff1
Aliases: CVE-2023-41835 GHSA-729q-fcgp-r5xh |
Incomplete Cleanup When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied. Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue. | There are no reported fixed by versions. |
|
VCID-ws2y-bbks-5kb1
Aliases: CVE-2017-9791 GHSA-29rm-6752-gvwv |
Code execution in Apache Struts 1 plugin The Struts 1 plugin used with Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||