Vulnerabilites related to opensymphony - xwork
Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
Impacted products
Vendor Product Version
apache struts 2.2.1
opensymphony xwork 2.2.1
opensymphony webwork -
opensymphony xwork -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "86571CB0-00C3-407E-AA23-F84628AC4EA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensymphony:webwork:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D68135-A485-4A9D-AA01-6F11D166A604",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63E63E98-5734-4CA9-98BA-1040B2CF4C77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3."
    },
    {
      "lang": "es",
      "value": "XWork v2.2.1 en Apache Struts v2.2.1, y XWork OpenSymphony en OpenSymphony WebWork, permite a atacantes remotos obtener informaci\u00f3n sensible acerca de las rutas internas de clases Java a trav\u00e9s de vectores implican un elemento s:submit y un m\u00e9todo inexistente, una vulnerabilidad diferente de CVE-2011-1772.3."
    }
  ],
  "id": "CVE-2011-2088",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-05-13T17:05:45.283",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://issues.apache.org/jira/browse/WW-3579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://issues.apache.org/jira/browse/WW-3579"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-23 14:19
Modified
2025-04-09 00:30
Severity ?
Summary
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
References
cve@mitre.orghttp://fisheye6.atlassian.com/cru/CR-9/Patch
cve@mitre.orghttp://issues.apache.org/struts/browse/WW-2692Exploit
cve@mitre.orghttp://jira.opensymphony.com/browse/XW-641Exploit
cve@mitre.orghttp://osvdb.org/49732
cve@mitre.orghttp://secunia.com/advisories/32495Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32497Vendor Advisory
cve@mitre.orghttp://struts.apache.org/2.x/docs/s2-003.htmlExploit
cve@mitre.orghttp://www.securityfocus.com/bid/32101
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3003Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3004
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46328
af854a3a-2127-422b-91ae-364da2661108http://fisheye6.atlassian.com/cru/CR-9/Patch
af854a3a-2127-422b-91ae-364da2661108http://issues.apache.org/struts/browse/WW-2692Exploit
af854a3a-2127-422b-91ae-364da2661108http://jira.opensymphony.com/browse/XW-641Exploit
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/49732
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32495Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32497Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://struts.apache.org/2.x/docs/s2-003.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/32101
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3003Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3004
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46328
Impacted products
Vendor Product Version
opensymphony xwork 2.0.0
opensymphony xwork 2.0.1
opensymphony xwork 2.0.2
opensymphony xwork 2.0.3
opensymphony xwork 2.0.4
opensymphony xwork 2.0.5
opensymphony xwork 2.1.0
opensymphony xwork 2.1.1
apache struts 2.0.0
apache struts 2.0.2
apache struts 2.0.3
apache struts 2.0.4
apache struts 2.0.5
apache struts 2.0.6
apache struts 2.0.7
apache struts 2.0.8
apache struts 2.0.9
apache struts 2.0.11
apache struts 2.0.11.1
apache struts 2.0.11.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB359E4-7D59-4124-855D-8E9CF71554CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF27EEA-B36A-4FA1-BC8F-37003457FD53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABB7703-3606-4983-ADCE-829A3291ED66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "89891ADF-86DD-4921-81CA-8482FA6AD156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "00DB2D6F-008C-4132-B7A5-86366AE4C551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A1AC722-E97E-4EA2-A6F6-9C6EED5131E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "318A2710-854A-44BB-8A9D-C5C360BC48E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "32976658-0BE5-42E2-A466-7CB9FF5ABF40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character."
    },
    {
      "lang": "es",
      "value": "ParametersInterceptor en OpenSymphony XWork 2.0.x antes de 2.0.6 y 2.1.x antes de 2.1.2, tal como se utiliza en Apache Struts y otros productos, no restringe adecuadamente las referencias # (almohadilla) a objetos de contexto, lo que permite a atacantes remotos ejecutar sentencias OGNL (Object-Graph Navigation Language) y modificar los objetos del contexto del lado del servidor contexto objetos, como lo demuestra el uso de una representaci\u00f3n \\u0023 del car\u00e1cter #."
    }
  ],
  "id": "CVE-2008-6504",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-23T14:19:12.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://fisheye6.atlassian.com/cru/CR-9/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://issues.apache.org/struts/browse/WW-2692"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://jira.opensymphony.com/browse/XW-641"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/49732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32495"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32497"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://struts.apache.org/2.x/docs/s2-003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32101"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/3003"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/3004"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://fisheye6.atlassian.com/cru/CR-9/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://issues.apache.org/struts/browse/WW-2692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://jira.opensymphony.com/browse/XW-641"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/49732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32497"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://struts.apache.org/2.x/docs/s2-003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/3003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-08-28 01:17
Modified
2025-04-09 00:30
Severity ?
Summary
Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
References
cve@mitre.orghttp://forums.opensymphony.com/ann.jspa?annID=54Patch, Vendor Advisory
cve@mitre.orghttp://issues.apache.org/struts/browse/WW-2030Third Party Advisory
cve@mitre.orghttp://jira.opensymphony.com/browse/XW-544Vendor Advisory
cve@mitre.orghttp://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21701Vendor Advisory
cve@mitre.orghttp://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21706Vendor Advisory
cve@mitre.orghttp://osvdb.org/37072Broken Link
cve@mitre.orghttp://secunia.com/advisories/26681Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/26693Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/26694Third Party Advisory
cve@mitre.orghttp://struts.apache.org/2.x/docs/s2-001.htmlPatch, Third Party Advisory
cve@mitre.orghttp://wiki.opensymphony.com/display/WW/1.2.3+Press+ReleaseVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/25524Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3041Third Party Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3042Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://forums.opensymphony.com/ann.jspa?annID=54Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://issues.apache.org/struts/browse/WW-2030Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://jira.opensymphony.com/browse/XW-544Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21701Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050&styleName=Html&version=21706Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37072Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26681Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26693Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26694Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://struts.apache.org/2.x/docs/s2-001.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://wiki.opensymphony.com/display/WW/1.2.3+Press+ReleaseVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25524Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3041Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3042Third Party Advisory
Impacted products
Vendor Product Version
opensymphony xwork *
opensymphony xwork *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6AFB5F9-70BE-4524-8112-BBCD7AD23362",
              "versionEndExcluding": "1.2.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE01415-0D93-4D31-A33C-04DC06A2AF66",
              "versionEndIncluding": "2.0.4",
              "versionStartIncluding": "2.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a \"%{\" sequence and ending with a \"}\" character."
    },
    {
      "lang": "es",
      "value": "Struts apoyado en OpenSymphony XWork anterior a  1.2.3, y 2.x anterior a 2.0.4, tal y como se utiliza en  WebWork y Apache Struts, recursivamente evalua todas las entradas como una expresi\u00f3n Object-Graph Navigation Language (OGNL) cuando altSyntax est\u00e1 activado, lo cual permite a atacantes remotos provocar denegaci\u00f3n de servicio (bucle infinito) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un formulario de entradad comenzando con una secuencia \"%{\" y finalizando con un caracter \"}\"."
    }
  ],
  "id": "CVE-2007-4556",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-28T01:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://forums.opensymphony.com/ann.jspa?annID=54"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://issues.apache.org/struts/browse/WW-2030"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jira.opensymphony.com/browse/XW-544"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21701"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21706"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/37072"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26681"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26693"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26694"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://struts.apache.org/2.x/docs/s2-001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/25524"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3041"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://forums.opensymphony.com/ann.jspa?annID=54"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://issues.apache.org/struts/browse/WW-2030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jira.opensymphony.com/browse/XW-544"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/37072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26693"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/26694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://struts.apache.org/2.x/docs/s2-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/25524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/3042"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-13 17:05
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
References
secalert@redhat.comhttp://jvn.jp/en/jp/JVN25435092/index.html
secalert@redhat.comhttp://jvndb.jvn.jp/jvndb/JVNDB-2011-000106
secalert@redhat.comhttp://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html
secalert@redhat.comhttp://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.htmlExploit
secalert@redhat.comhttp://struts.apache.org/2.2.3/docs/version-notes-223.html
secalert@redhat.comhttp://struts.apache.org/2.x/docs/s2-006.htmlExploit, Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/47784Exploit
secalert@redhat.comhttp://www.ventuneac.net/security-advisories/MVSA-11-006Exploit
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/1198Vendor Advisory
secalert@redhat.comhttps://issues.apache.org/jira/browse/WW-3579Patch
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN25435092/index.html
af854a3a-2127-422b-91ae-364da2661108http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106
af854a3a-2127-422b-91ae-364da2661108http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html
af854a3a-2127-422b-91ae-364da2661108http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://struts.apache.org/2.2.3/docs/version-notes-223.html
af854a3a-2127-422b-91ae-364da2661108http://struts.apache.org/2.x/docs/s2-006.htmlExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/47784Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.ventuneac.net/security-advisories/MVSA-11-006Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/1198Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://issues.apache.org/jira/browse/WW-3579Patch
Impacted products
Vendor Product Version
apache struts 2.0.0
apache struts 2.0.1
apache struts 2.0.2
apache struts 2.0.3
apache struts 2.0.4
apache struts 2.0.5
apache struts 2.0.6
apache struts 2.0.7
apache struts 2.0.8
apache struts 2.0.9
apache struts 2.0.10
apache struts 2.0.11
apache struts 2.0.11.1
apache struts 2.0.11.2
apache struts 2.0.12
apache struts 2.0.13
apache struts 2.0.14
apache struts 2.1.0
apache struts 2.1.1
apache struts 2.1.2
apache struts 2.1.3
apache struts 2.1.4
apache struts 2.1.5
apache struts 2.1.6
apache struts 2.1.8
apache struts 2.1.8.1
apache struts 2.2.1
apache struts 2.2.1.1
opensymphony webwork *
opensymphony xwork *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensymphony:webwork:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09604417-9AF3-4F95-8E7A-695AD510168E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensymphony:xwork:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D54BC82-0A21-42F7-9439-EB6BF2E95393",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en  XWork en Apache Struts v2.x anterior a v2.2.3, y OpenSymphony XWork en OpenSymphony WebWork, permite a atacantes remotos inyectar c\u00f3digo web script o HTML a trav\u00e9s de vectores que implican (1) un \"action name\", (2) la acci\u00f3n atributo de un elemento \"s:submit\", o (3) el atributo del m\u00e9todo del elemento \"s:submit\"."
    }
  ],
  "id": "CVE-2011-1772",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-05-13T17:05:44.267",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://jvn.jp/en/jp/JVN25435092/index.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://struts.apache.org/2.x/docs/s2-006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/47784"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1198"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://issues.apache.org/jira/browse/WW-3579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN25435092/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://struts.apache.org/2.x/docs/s2-006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/47784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/1198"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://issues.apache.org/jira/browse/WW-3579"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2011-2088 (GCVE-0-2011-2088)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-08-06 22:46
Severity ?
CWE
  • n/a
Summary
XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:46:00.961Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://issues.apache.org/jira/browse/WW-3579"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
          },
          {
            "name": "20110518 Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://issues.apache.org/jira/browse/WW-3579"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
        },
        {
          "name": "20110518 Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2088",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://issues.apache.org/jira/browse/WW-3579",
              "refsource": "MISC",
              "url": "https://issues.apache.org/jira/browse/WW-3579"
            },
            {
              "name": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html",
              "refsource": "MISC",
              "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
            },
            {
              "name": "http://www.ventuneac.net/security-advisories/MVSA-11-006",
              "refsource": "MISC",
              "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
            },
            {
              "name": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html",
              "refsource": "MISC",
              "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
            },
            {
              "name": "20110518 Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/518066/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2088",
    "datePublished": "2011-05-13T17:00:00",
    "dateReserved": "2011-05-13T00:00:00",
    "dateUpdated": "2024-08-06T22:46:00.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-6504 (GCVE-0-2008-6504)
Vulnerability from cvelistv5
Published
2009-03-23 14:00
Modified
2024-08-07 11:34
Severity ?
CWE
  • n/a
Summary
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
References
http://secunia.com/advisories/32495 third-party-advisory, x_refsource_SECUNIA
http://fisheye6.atlassian.com/cru/CR-9/ x_refsource_CONFIRM
http://struts.apache.org/2.x/docs/s2-003.html x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/46328 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2008/3003 vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/3004 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/32101 vdb-entry, x_refsource_BID
http://secunia.com/advisories/32497 third-party-advisory, x_refsource_SECUNIA
http://jira.opensymphony.com/browse/XW-641 x_refsource_CONFIRM
http://issues.apache.org/struts/browse/WW-2692 x_refsource_CONFIRM
http://osvdb.org/49732 vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:34:47.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32495",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32495"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://fisheye6.atlassian.com/cru/CR-9/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://struts.apache.org/2.x/docs/s2-003.html"
          },
          {
            "name": "xwork-parameterinterceptor-security-bypass(46328)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328"
          },
          {
            "name": "ADV-2008-3003",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3003"
          },
          {
            "name": "ADV-2008-3004",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3004"
          },
          {
            "name": "32101",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32101"
          },
          {
            "name": "32497",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32497"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.opensymphony.com/browse/XW-641"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://issues.apache.org/struts/browse/WW-2692"
          },
          {
            "name": "49732",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/49732"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32495",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32495"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://fisheye6.atlassian.com/cru/CR-9/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://struts.apache.org/2.x/docs/s2-003.html"
        },
        {
          "name": "xwork-parameterinterceptor-security-bypass(46328)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328"
        },
        {
          "name": "ADV-2008-3003",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3003"
        },
        {
          "name": "ADV-2008-3004",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3004"
        },
        {
          "name": "32101",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32101"
        },
        {
          "name": "32497",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32497"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.opensymphony.com/browse/XW-641"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://issues.apache.org/struts/browse/WW-2692"
        },
        {
          "name": "49732",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/49732"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6504",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32495",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32495"
            },
            {
              "name": "http://fisheye6.atlassian.com/cru/CR-9/",
              "refsource": "CONFIRM",
              "url": "http://fisheye6.atlassian.com/cru/CR-9/"
            },
            {
              "name": "http://struts.apache.org/2.x/docs/s2-003.html",
              "refsource": "CONFIRM",
              "url": "http://struts.apache.org/2.x/docs/s2-003.html"
            },
            {
              "name": "xwork-parameterinterceptor-security-bypass(46328)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328"
            },
            {
              "name": "ADV-2008-3003",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3003"
            },
            {
              "name": "ADV-2008-3004",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3004"
            },
            {
              "name": "32101",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32101"
            },
            {
              "name": "32497",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32497"
            },
            {
              "name": "http://jira.opensymphony.com/browse/XW-641",
              "refsource": "CONFIRM",
              "url": "http://jira.opensymphony.com/browse/XW-641"
            },
            {
              "name": "http://issues.apache.org/struts/browse/WW-2692",
              "refsource": "CONFIRM",
              "url": "http://issues.apache.org/struts/browse/WW-2692"
            },
            {
              "name": "49732",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/49732"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6504",
    "datePublished": "2009-03-23T14:00:00",
    "dateReserved": "2009-03-23T00:00:00",
    "dateUpdated": "2024-08-07T11:34:47.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4556 (GCVE-0-2007-4556)
Vulnerability from cvelistv5
Published
2007-08-28 01:00
Modified
2024-08-07 15:01
Severity ?
CWE
  • n/a
Summary
Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a "%{" sequence and ending with a "}" character.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.871Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25524",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25524"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.opensymphony.com/browse/XW-544"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://issues.apache.org/struts/browse/WW-2030"
          },
          {
            "name": "ADV-2007-3041",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3041"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forums.opensymphony.com/ann.jspa?annID=54"
          },
          {
            "name": "ADV-2007-3042",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3042"
          },
          {
            "name": "26693",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26693"
          },
          {
            "name": "26681",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21706"
          },
          {
            "name": "37072",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37072"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://struts.apache.org/2.x/docs/s2-001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21701"
          },
          {
            "name": "26694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26694"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a \"%{\" sequence and ending with a \"}\" character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25524",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25524"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.opensymphony.com/browse/XW-544"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://issues.apache.org/struts/browse/WW-2030"
        },
        {
          "name": "ADV-2007-3041",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3041"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forums.opensymphony.com/ann.jspa?annID=54"
        },
        {
          "name": "ADV-2007-3042",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3042"
        },
        {
          "name": "26693",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26693"
        },
        {
          "name": "26681",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21706"
        },
        {
          "name": "37072",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37072"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://struts.apache.org/2.x/docs/s2-001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21701"
        },
        {
          "name": "26694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26694"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4556",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is enabled, which allows remote attackers to cause a denial of service (infinite loop) or execute arbitrary code via form input beginning with a \"%{\" sequence and ending with a \"}\" character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25524",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25524"
            },
            {
              "name": "http://jira.opensymphony.com/browse/XW-544",
              "refsource": "CONFIRM",
              "url": "http://jira.opensymphony.com/browse/XW-544"
            },
            {
              "name": "http://issues.apache.org/struts/browse/WW-2030",
              "refsource": "CONFIRM",
              "url": "http://issues.apache.org/struts/browse/WW-2030"
            },
            {
              "name": "ADV-2007-3041",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3041"
            },
            {
              "name": "http://forums.opensymphony.com/ann.jspa?annID=54",
              "refsource": "CONFIRM",
              "url": "http://forums.opensymphony.com/ann.jspa?annID=54"
            },
            {
              "name": "ADV-2007-3042",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3042"
            },
            {
              "name": "26693",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26693"
            },
            {
              "name": "26681",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26681"
            },
            {
              "name": "http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release",
              "refsource": "CONFIRM",
              "url": "http://wiki.opensymphony.com/display/WW/1.2.3+Press+Release"
            },
            {
              "name": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21706",
              "refsource": "CONFIRM",
              "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21706"
            },
            {
              "name": "37072",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37072"
            },
            {
              "name": "http://struts.apache.org/2.x/docs/s2-001.html",
              "refsource": "CONFIRM",
              "url": "http://struts.apache.org/2.x/docs/s2-001.html"
            },
            {
              "name": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21701",
              "refsource": "CONFIRM",
              "url": "http://jira.opensymphony.com/secure/ReleaseNote.jspa?projectId=10050\u0026styleName=Html\u0026version=21701"
            },
            {
              "name": "26694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26694"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4556",
    "datePublished": "2007-08-28T01:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.871Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1772 (GCVE-0-2011-1772)
Vulnerability from cvelistv5
Published
2011-05-13 17:00
Modified
2024-08-06 22:37
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-1198",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/1198"
          },
          {
            "name": "47784",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/47784"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://struts.apache.org/2.x/docs/s2-006.html"
          },
          {
            "name": "JVNDB-2011-000106",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106"
          },
          {
            "name": "JVN#25435092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN25435092/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.apache.org/jira/browse/WW-3579"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache Struts 2.x before 2.2.3, and OpenSymphony XWork in OpenSymphony WebWork, allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) an action name, (2) the action attribute of an s:submit element, or (3) the method attribute of an s:submit element."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-19T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "ADV-2011-1198",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/1198"
        },
        {
          "name": "47784",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/47784"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://struts.apache.org/2.x/docs/s2-006.html"
        },
        {
          "name": "JVNDB-2011-000106",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000106"
        },
        {
          "name": "JVN#25435092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN25435092/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secureappdev.blogspot.com/2011/05/Struts_2_XWork_WebWork_XSS_in_error_pages.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://struts.apache.org/2.2.3/docs/version-notes-223.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ventuneac.net/security-advisories/MVSA-11-006"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.apache.org/jira/browse/WW-3579"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secureappdev.blogspot.com/2011/05/apache-struts-2-xwork-webwork-reflected.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1772",
    "datePublished": "2011-05-13T17:00:00",
    "dateReserved": "2011-04-19T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}