Description
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
Remediation
References
http://struts.apache.org/docs/s2-029.html
http://www.securityfocus.com/bid/85066
http://www.securitytracker.com/id/1035271
Related Vulnerabilities
CVE-2018-1274 Vulnerability in maven package org.springframework.data:spring-data-commons
CVE-2021-38296 Vulnerability in maven package org.apache.spark:spark-core
CVE-2023-45311 Vulnerability in npm package fsevents
CVE-2021-41303 Vulnerability in maven package org.apache.shiro:shiro-core
CVE-2022-43427 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-for-total-test