Apache Struts < 2.5.29 - Remote Code Execution
Title source: ruleDescription
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
Exploits (10)
nomisec
WORKING POC
1 stars
by JordanANDJohn · poc
https://github.com/JordanANDJohn/CVE-2021-31805-POC
Nuclei Templates (1)
Apache Struts2 S2-062 - Remote Code Execution
CRITICALby taielab
Shodan:
http.html:"apache struts" || http.title:"struts2 showcase" || http.html:"struts problem report"
FOFA:
body="struts problem report" || title="struts2 showcase" || body="apache struts"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9396
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+7 more repos
Details
VulnCheck KEV
2022-05-11
CWE
CWE-917
Status
published
Products (2)
apache/struts
2.0.0 - 2.5.29
org.apache.struts/struts2-core
2.0.0 - 2.5.30Maven
Published
Apr 12, 2022
Tracked Since
Feb 18, 2026