CVE-2015-1831:
Incomplete exclude pattern in Apache Struts
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.90245%
CWE
-
Published
5/17/2022
Updated
12/28/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.struts:struts2-core | maven | >= 2.0.0, < 2.3.20.1 | 2.3.20.1 |
org.apache.struts.xwork:xwork-core | maven | >= 2.0.0, < 2.3.20.1 | 2.3.20.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from three key insecure configurations:
- The params interceptor's explicit excludeParams pattern was insufficient to block dangerous parameters
- DefaultExcludedPatternsChecker's hardcoded patterns lacked protections against class property manipulation
- Package name exclusion patterns improperly handled javax.* namespace These were all addressed in the patch by:
- Removing manual excludeParams overrides to use improved defaults
- Consolidating security patterns with negative lookaheads
- Adding class-related exclusion patterns
- Refining javax package exclusions