CVE-2019-0233:
Improper Preservation of Permissions in Apache Struts
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88916%
CWE
Published
5/24/2022
Updated
1/27/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.struts:struts2-core | maven | >= 2.0.0, < 2.5.22 | 2.5.22 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Struts' failure to exclude java.io/nio packages in property evaluation. The ParametersInterceptor handles parameter binding using OGNL, and the OgnlUtil class performs the actual property operations. The patch modifies excluded packages in struts-default.xml (org/apache/struts2/default.properties) which affects these components' security checks. These functions would appear in stack traces when processing malicious file upload parameters that access File object properties.