Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| org.apache.struts:struts2-core(Maven) | 2.0.0 | 2.3.14.3 | N/A |
| org.apache.struts.xwork:xwork-core(Maven) | 2.0.0 | 2.3.14.3 | N/A |
CVSS Metrics