Description
Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
Remediation
References
http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html
http://secunia.com/advisories/47109
https://issues.apache.org/jira/browse/WW-2264
https://issues.apache.org/jira/browse/WW-3631
Related Vulnerabilities
CVE-2014-10065 Vulnerability in maven package org.webjars:remarkable
CVE-2020-2285 Vulnerability in maven package org.jenkins-ci.plugins:liquibase-runner
CVE-2022-39299 Vulnerability in npm package node-saml
CVE-2022-35916 Vulnerability in npm package @openzeppelin/contracts
CVE-2018-16487 Vulnerability in maven package org.webjars:lodash