Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31805— Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.

EPSS 93.96% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-31805

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.
Source: NVD (National Vulnerability Database)
Vulnerability Description
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
表达式语言语句中使用的特殊元素转义处理不恰当(表达式语言注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Struts 2 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Struts 2是美国阿帕奇(Apache)基金会的一个用于开发Java EE网络应用程序的开放源代码网页应用程序架构。 Apache Struts 2.0.0版本至2.5.29版本存在安全漏洞,该漏洞源于对不受信任的用户输入在标签属性中使用强制 OGNL 评估。攻击者可利用该漏洞进行远程代码执行并导致安全性降低。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Struts 2.0.0 to 2.5.29 -

II. Public POCs for CVE-2021-31805

#POC DescriptionSource LinkShenlong Link
1远程代码执行S2-062 CVE-2021-31805验证POChttps://github.com/pyroxenites/s2-062POC Details
2S2-062 (CVE-2021-31805) / S2-061 / S2-059 RCEhttps://github.com/Wrin9/CVE-2021-31805POC Details
3Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shellhttps://github.com/Axx8/Struts2_S2-062_CVE-2021-31805POC Details
4Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用https://github.com/jax7sec/S2-062POC Details
5 PoC for CVE-2021-31805 (Apache Struts2)https://github.com/aeyesec/CVE-2021-31805POC Details
6Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用)https://github.com/fleabane1/CVE-2021-31805-POCPOC Details
7S2-061/S2-062 Struts2 远程命令执行漏洞 POC&EXPhttps://github.com/z92g/CVE-2021-31805POC Details
8Vulnerable environment of CVE-2021-31805 (S2-062) for testinghttps://github.com/nth347/CVE-2021-31805POC Details
9Apache Struts2 S2-062 is vulnerable to remote code execution. The fix issued for CVE-2020-17530 (S2-061) was incomplete, meaning some of the tag's attributes could still perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-31805.yamlPOC Details
10Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-062%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2021-31805.mdPOC Details
11Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shellhttps://github.com/SecNN/Struts2_S2-062_CVE-2021-31805POC Details
12Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用)https://github.com/JordanANDJohn/CVE-2021-31805-POCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-31805

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2022-04-12 · 3 CVEs total

CVE-2021-28544Apache Subversion SVN authz protected copyfrom paths regression
CVE-2022-24070Apache Subversion mod_dav_svn is vulnerable to memory corruption

IV. Related Vulnerabilities

V. Comments for CVE-2021-31805

No comments yet


Leave a comment