Apache Struts's CookieInterceptor component does not use the parameter-name whitelist
Moderate severity
GitHub Reviewed
Published
May 4, 2022
to the GitHub Advisory Database
•
Updated Dec 27, 2023
Description
Published by the National Vulnerability Database
Jan 8, 2012
Published to the GitHub Advisory Database
May 4, 2022
Reviewed
Dec 27, 2023
Last updated
Dec 27, 2023
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method.
References