GHSA-jc35-q369-45pv
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://nvd.nist.gov/vuln/detail/CVE-2020-17530, https://cwiki.apache.org/confluence/display/WW/S2-061, https://github.com/apache/struts, https://security.netapp.com/advisory/ntap-20210115-0005, https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-17530, https://www.oracle.com//security-alerts/cpujul2021.html, https://www.oracle.com/security-alerts/cpuApr2021.html, https://www.oracle.com/security-alerts/cpuapr2022.html, https://www.oracle.com/security-alerts/cpujan2021.html, https://www.oracle.com/security-alerts/cpujan2022.html, https://www.oracle.com/security-alerts/cpuoct2021.html, http://jvn.jp/en/jp/JVN43969166/index.html, http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html, http://www.openwall.com/lists/oss-security/2022/04/12/6
