Apache Struts 2 prior to 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote malicious users to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache struts |