CVE-2013-1966: Arbitrary code execution in Apache Struts
9.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99699%
CWE
Published
5/14/2022
Updated
12/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.struts:struts2-core | maven | >= 2.0.0, < 2.3.14.2 | 2.3.14.2 |
org.apache.struts.xwork:xwork-core | maven | >= 2.0.0, < 2.3.14.2 | 2.3.14.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper OGNL expression evaluation in URL/A tag parameters. The patch added enableOGNLEvalExpression
checks in OgnlUtil.compile()
and modified signature to include context. The vulnerable versions' compile()
method (without context parameter) lacked eval expression validation, and setValue()
propagated this insecure compilation. The GHSA/CVE analysis explicitly links OGNL evaluation to RCE via these code paths.