Bug 975282 (CVE-2016-0785) - VUL-0: CVE-2016-0785: struts: Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence
Summary: VUL-0: CVE-2016-0785: struts: Apache Struts 2.x before 2.3.28 allows remote a...
Status: RESOLVED INVALID
Alias: CVE-2016-0785
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/167746/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-04-13 08:25 UTC by Johannes Segitz
Modified: 2016-04-13 11:15 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2016-04-13 08:25:43 UTC
CVE-2016-0785

Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary
code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0785
http://www.securitytracker.com/id/1035271
http://struts.apache.org/docs/s2-029.html
Comment 3 Johannes Segitz 2016-04-13 11:15:00 UTC
not affected