CVE-2021-31805

CRITICAL EXPLOITED NUCLEI LAB

Apache Struts < 2.5.29 - Remote Code Execution

Title source: rule

Description

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

Exploits (10)

nomisec WORKING POC 131 stars
by pyroxenites · remote
https://github.com/pyroxenites/s2-062
nomisec WORKING POC 37 stars
by Wrin9 · remote
https://github.com/Wrin9/CVE-2021-31805
nomisec WORKING POC 23 stars
by jax7sec · remote
https://github.com/jax7sec/S2-062
nomisec WORKING POC 11 stars
by SecNN · poc
https://github.com/SecNN/Struts2_S2-062_CVE-2021-31805
nomisec WORKING POC 6 stars
by z92g · poc
https://github.com/z92g/CVE-2021-31805
nomisec WORKING POC 5 stars
by aeyesec · poc
https://github.com/aeyesec/CVE-2021-31805
nomisec WORKING POC 1 stars
by JordanANDJohn · poc
https://github.com/JordanANDJohn/CVE-2021-31805-POC
nomisec STUB
by nth347 · poc
https://github.com/nth347/CVE-2021-31805
vulncheck_xdb WORKING POC
remote
https://github.com/fleabane1/CVE-2021-31805-POC
vulncheck_xdb WORKING POC
remote
https://github.com/Axx8/Struts2_S2-062_CVE-2021-31805

Nuclei Templates (1)

Apache Struts2 S2-062 - Remote Code Execution
CRITICALby taielab
Shodan: http.html:"apache struts" || http.title:"struts2 showcase" || http.html:"struts problem report"
FOFA: body="struts problem report" || title="struts2 showcase" || body="apache struts"

Scores

CVSS v3 9.8
EPSS 0.9396
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2022-05-11
CWE
CWE-917
Status published
Products (2)
apache/struts 2.0.0 - 2.5.29
org.apache.struts/struts2-core 2.0.0 - 2.5.30Maven
Published Apr 12, 2022
Tracked Since Feb 18, 2026