CVE-2012-0838: Apache Struts Code injection due to conversion error
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98446%
CWE
Published
5/14/2022
Updated
12/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.struts:struts2-core | maven | < 2.2.3.1 | 2.2.3.1 |
org.apache.struts.xwork:xwork-core | maven | < 2.2.3.1 | 2.2.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of user input during conversion errors. Key vulnerable functions were identified by:
- The patch replacing unsafe string concatenation with escaping in getOverrideExpr methods (CVE-2012-0838's root cause)
- Modifications to RepopulateConversionErrorFieldValidatorSupport showing previous direct OGNL expression construction
- Test cases demonstrating malicious OGNL payload injection via conversion errors
- Commit messages explicitly referencing WW-3668/S2-007 security fixes All identified functions directly processed user input without adequate escaping before embedding in OGNL expressions, meeting CWE-20 criteria.