CVE-2020-17530: Remote code execution in Apache Struts
(updated )
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
References
- cwiki.apache.org/confluence/display/WW/S2-061
- github.com/advisories/GHSA-jc35-q369-45pv
- github.com/apache/struts
- nvd.nist.gov/vuln/detail/CVE-2020-17530
- security.netapp.com/advisory/ntap-20210115-0005
- www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-17530
- www.oracle.com//security-alerts/cpujul2021.html
- www.oracle.com/security-alerts/cpuApr2021.html
- www.oracle.com/security-alerts/cpuapr2022.html
- www.oracle.com/security-alerts/cpujan2021.html
- www.oracle.com/security-alerts/cpujan2022.html
- www.oracle.com/security-alerts/cpuoct2021.html
Code Behaviors & Features
Detect and mitigate CVE-2020-17530 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →