漏洞描述 Apache Struts2是一个基于Java的开源Web应用框架。该漏洞源于在处理转换错误时评估字符串为OGNL表达式,导致远程攻击者可利用此漏洞借助无效的输入,修改run-time数据值,进而执行任意代码。此漏洞利用难度低且危害严重,可导致服务器完全失陷,建议企业立即升级至安全版本。
相关漏洞推荐 Apache Struts2 S2-067 /index.action 文件上传漏洞(CVE-2024-53677) POC CVE-2007-4556: OpenSymphony XWork/Apache Struts2 - Remote Code Execution POC CVE-2012-0392: Apache Struts2 S2-008 RCE POC CVE-2013-1965: Apache Struts2 S2-012 RCE POC CVE-2017-12611: Apache Struts2 S2-053 - Remote Code Execution POC CVE-2017-9791: Apache Struts2 S2-053 - Remote Code Execution POC CVE-2017-9805: Apache Struts2 S2-052 - Remote Code Execution POC CVE-2018-11776: Apache Struts2 S2-057 - Remote Code Execution POC CVE-2021-31805: Apache Struts2 S2-062 - Remote Code Execution POC CVE-2007-4556: OpenSymphony XWork/Apache Struts2 - Remote Code Execution S2-001 POC CVE-2012-0392: Apache Struts2 S2-008 RCE POC CVE-2013-1965: Apache Struts2 S2-012 RCE POC CVE-2017-12611: Apache Struts2 S2-053 - Remote Code Execution