Apache Struts vulnerable to Improper Input Validation
High severity
GitHub Reviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Feb 13, 2023
Description
Published by the National Vulnerability Database
Mar 30, 2006
Published to the GitHub Advisory Database
May 1, 2022
Reviewed
Jun 7, 2022
Last updated
Feb 13, 2023
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
References