GHSA-WXW2-2MX5-C5QF
Vulnerability from github – Published: 2022-05-17 02:11 – Updated: 2022-11-01 22:34
VLAI?
Summary
Improper Input Validation in OpenSymphony XWork
Details
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "com.opensymphony:xwork"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.0.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "com.opensymphony:xwork"
},
"ranges": [
{
"events": [
{
"introduced": "2.1.0"
},
{
"fixed": "2.1.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2008-6504"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2022-11-01T22:34:44Z",
"nvd_published_at": "2009-03-23T14:19:00Z",
"severity": "MODERATE"
},
"details": "ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \\u0023 representation for the # character.",
"id": "GHSA-wxw2-2mx5-c5qf",
"modified": "2022-11-01T22:34:44Z",
"published": "2022-05-17T02:11:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6504"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46328"
},
{
"type": "WEB",
"url": "http://fisheye6.atlassian.com/cru/CR-9"
},
{
"type": "WEB",
"url": "http://issues.apache.org/struts/browse/WW-2692"
},
{
"type": "WEB",
"url": "http://jira.opensymphony.com/browse/XW-641"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32495"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32497"
},
{
"type": "WEB",
"url": "http://struts.apache.org/2.x/docs/s2-003.html"
},
{
"type": "WEB",
"url": "http://web.archive.org/web/20081119232431/jira.opensymphony.com/browse/XW-641"
},
{
"type": "WEB",
"url": "http://web.archive.org/web/20130807023152/https://fisheye6.atlassian.com/cru/CR-9"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/32101"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/3003"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/3004"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Improper Input Validation in OpenSymphony XWork"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…