Description
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
Remediation
References
http://struts.apache.org/docs/s2-029.html
http://www.securityfocus.com/bid/85066
http://www.securitytracker.com/id/1035271
Related Vulnerabilities
CVE-2023-4301 Vulnerability in maven package org.jenkins-ci.plugins:fortify
CVE-2020-7961 Vulnerability in maven package com.liferay.portal:com.liferay.portal.impl
CVE-2017-4960 Vulnerability in maven package org.cloudfoundry.identity:cloudfoundry-identity-uaa
CVE-2016-0781 Vulnerability in maven package org.cloudfoundry.identity:cloudfoundry-identity-login
CVE-2021-43306 Vulnerability in maven package org.webjars.npm:jquery-validation