-
CVSS Score
-The vulnerability stems from two key issues: 1) In DefaultActionMapper, action names derived from URIs were not properly sanitized before being processed, allowing OGNL injection via wildcard mappings. The pre-patch parseNameAndNamespace method directly used raw input without the cleanupActionName regex filtering added in the fix. 2) The OgnlTextParser's evaluation logic allowed recursive parsing of expressions (e.g., ${%{1+2}}), enabling double evaluation. The combination of these flaws allowed attackers to inject OGNL expressions through action names that bypassed validation and were evaluated multiple times.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.struts:struts2-core | maven | >= 2.0.0, < 2.3.14.3 | 2.3.14.3 |
| org.apache.struts.xwork:xwork-core | maven | >= 2.0.0, < 2.3.14.3 | 2.3.14.3 |