The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.3.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.4"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.4.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.7"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.8"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.12"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.14"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.14.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.14.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.14.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.15"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.15.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.15.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.15.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.16"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.16.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.16.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.16.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.20"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.20.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.20.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.24"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.24.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.24.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.28"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.28.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.29"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.30"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.31"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.32"
}
]
}