CVE-2010-1870
NUCLEIStruts 2.0.0-2.1.8.1 - RCE
Title source: llmDescription
The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/17691
exploitdb
WORKING POC
by Meder Kydyraliev · textremotemultiple
https://www.exploit-db.com/exploits/14360
metasploit
WORKING POC
GOOD
by bannedit, Meder Kydyraliev · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts_code_exec.rb
Nuclei Templates (1)
ListSERV Maestro <= 9.0-8 RCE
MEDIUMby b0yd
Shodan:
http.html:"apache struts" || http.title:"struts2 showcase" || http.html:"struts problem report"
FOFA:
body="struts problem report" || title="struts2 showcase" || body="apache struts"
References (12)
Scores
EPSS
0.9253
EPSS Percentile
99.7%
Details
Status
published
Products (27)
apache/struts
2.0.0
apache/struts
2.0.1
apache/struts
2.0.2
apache/struts
2.0.3
apache/struts
2.0.4
apache/struts
2.0.5
apache/struts
2.0.6
apache/struts
2.0.7
apache/struts
2.0.8
apache/struts
2.0.9
... and 17 more
Published
Aug 17, 2010
Tracked Since
Feb 18, 2026