Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Exploited Vulnerability in Apache Struts 2

Issued: 
Tuesday, 26 April, 2022
Last Revision: 
Tuesday, 26 April, 2022
Vendor: 
Product: 
Severity Level: 
Summary: 

Apache Struts 2 is affected with a potential remote code execution vulnerability (CVE-2021-31805 OGNL Injection vulnerability), which has been disclosed and fixed by the Apache Software Foundation. The update was offered because the first patch, which was released in 2020, did not fully resolve the issue, according to an advisory S2-062 from Apache.

 

A remote attacker who exploits this flaw can run arbitrary code on the Apache Struts 2 server.

 

This is crucial because Apache Struts is extensively used, and an attacker who successfully exploits CVE2021-31805 can obtain control of a susceptible system.

 

CVE/Vulnerability

   Description 

CVSS3.0 Score

CVE-2021-31805

   Remote Code Execution Vulnerability

9.8 

 

 

Table 1: Vulnerability details 

 

 

 

 

CVE/Vulnerability

 Affected Products and Versions

CVE-2021-31805

Apache Struts 2 Versions 2.0.0 to 2.5.29

 

 

                                                                                       Table 2: Vulnerable versions 

Recommendation: 

Organization are advised to identify the usage of Apache Struts 2 Versions 2.0.0 to 2.5.29 in their environment and upgrade the affected software to Struts 2.5.30 or greater as soon as possible.