Description
Apache Struts 2.3.1.2 and earlier, 2.3.19-2.3.23, provides interfaces that do not properly restrict access to collections such as the session and request collections, which might allow remote attackers to modify run-time data values via a crafted parameter to an application that implements an affected interface, as demonstrated by the SessionAware, RequestAware, ApplicationAware, ServletRequestAware, ServletResponseAware, and ParameterAware interfaces. NOTE: the vendor disputes the significance of this report because of an "easy work-around in existing apps by configuring the interceptor."
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Hisato Killing · textremotemultiple
https://www.exploit-db.com/exploits/36426
References (4)
Core 4
Core References
Issue Tracking, Vendor Advisory x_refsource_confirm
https://issues.apache.org/jira/browse/WW-3631
Permissions Required third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/47109
Issue Tracking, Vendor Advisory x_refsource_confirm
https://issues.apache.org/jira/browse/WW-2264
Third Party Advisory x_refsource_misc
http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html
Scores
EPSS
0.5291
EPSS Percentile
98.0%
Details
CWE
CWE-264
Status
published
Products (1)
apache/struts
2.0.0 - 2.3.3
Published
Jan 08, 2012
Tracked Since
Feb 18, 2026