Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution Vulnerability CVE-2013-2251 Scanner

Details
Stay Up To Date
Asset Type

domain,ip,url

Need Membership

Yes

Asset Verify

Yes

API Support

Yes

Estimate Time (Second)

15

Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution Vulnerability CVE-2013-2251 Scanner Detail

There is a remote code execution vulnerability in Apache Struts2.

Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.

Some Advice for Common Problems

Update your Apache Struts Server, to the latest version to eliminate this vulnerability.

Need a Full Assesment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service