Description
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
Exploits (7)
exploitdb
WORKING POC
by West Shepherd · pythonremotemultiple
https://www.exploit-db.com/exploits/49068
nomisec
WORKING POC
by tw-eason-tseng · poc
https://github.com/tw-eason-tseng/CVE-2019-0230_Struts2S2-059
metasploit
WORKING POC
EXCELLENT
by Spencer McIntyre, Matthias Kaiser, Alvaro Muñoz, ka1n4t · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts2_multi_eval_ognl.rb
Nuclei Templates (1)
Apache Struts <=2.5.20 - Remote Code Execution
CRITICALby geeknik
Shodan:
http.html:"apache struts" || http.title:"struts2 showcase" || http.html:"struts problem report"
FOFA:
body="struts problem report" || title="struts2 showcase" || body="apache struts"
References (9)
Scores
CVSS v3
9.8
EPSS
0.9385
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+2 more repos
Details
CWE
CWE-1321
Status
published
Products (7)
apache/struts
2.0.0 - 2.5.20
oracle/communications_policy_management
12.5.0
oracle/financial_services_data_integration_hub
8.0.3
oracle/financial_services_data_integration_hub
8.0.6
oracle/financial_services_market_risk_measurement_and_management
8.0.6
oracle/mysql_enterprise_monitor
< 8.0.23
org.apache.struts/struts2-core
2.0.0 - 2.5.22Maven
Published
Sep 14, 2020
Tracked Since
Feb 18, 2026