Struts2/XWork remote command execution


A vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks. A request that included a specially crafted request parameter could be used to inject arbitrary OGNL code into the stack, afterward used as request parameter of an URL or A tag , which will cause a further evaluation.

The issue was originally addressed by Struts and Security Announcement S2-013. However, the solution introduced with did not address all possible attack vectors, such that every version of Struts 2 before is still vulnerable to such attacks.


It is strongly recommended to upgrade to Struts, which contains the corrected OGNL and XWork library.