Your submission was sent successfully! Close

CVE-2021-31805

Published: 12 April 2022

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libstruts1.2-java
Launchpad, Ubuntu, Debian
bionic Does not exist

focal Does not exist

impish Does not exist

jammy Does not exist

trusty Does not exist

upstream Not vulnerable
(debian: specific to 2.x)
xenial Does not exist