CVE-2016-0785 in Struts
Summary
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Reservation
12/16/2015
Disclosure
04/12/2016
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 81371 | Apache Struts Double OGNL Evaluation input validation | 20 | Not defined | Official fix | CVE-2016-0785 |