CVE-2013-2251
Scores
EPSS Score
0.9433
CVSS
3.x 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Description
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
Sources
CWEs
Related Vulnerabilities
Exploits
Exploit ID: CVE-2013-2251
Source: cisa
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Reference Links
Vulnerable Software
Type: Configuration
Product: libstruts1.2-java
Operating System: debian
{
"unaffected": true
}
Source: debian
Type: Configuration
Vendor: apache
Product: archiva
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.8",
"versionStartIncluding": "1.3",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:apache:archiva:1.2:-:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.15",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: apache
Product: struts
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:apache:archiva:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.8",
"versionStartIncluding": "1.3",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:apache:archiva:1.2:-:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:apache:archiva:1.2.2:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.3.15",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: gp-s_firmware
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fujitsu:gp-s_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:h:fujitsu:gp-s:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: gp5000_firmware
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fujitsu:gp5000_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:h:fujitsu:gp5000:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: gp7000f_firmware
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fujitsu:gp7000f_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:h:fujitsu:gp7000f:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: interstage_business_process_manager_analytics
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.0:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.10",
"versionStartIncluding": "5.0"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: interstage_business_process_manager_analytics
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:fujitsu:interstage_business_process_manager_analytics:12.1:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:oracle:solaris:11:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.10",
"versionStartIncluding": "5.0"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: primepower_firmware
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fujitsu:primepower_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:h:fujitsu:primepower:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: primergy_firmware
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fujitsu:primergy_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:h:fujitsu:primergy:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: fujitsu
Product: sparc_firmware
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:fujitsu:sparc_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:h:fujitsu:sparc:-:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd
Type: Configuration
Vendor: oracle
Product: siebel_apps_-_e-billing
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.1.1:*:*:*:*:*:*:*",
"vulnerable": true
},
{
"cpe23uri": "cpe:2.3:a:oracle:siebel_apps_-_e-billing:6.2:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd