Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Oct 2025, 00:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 05:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://jvn.jp/en/jp/JVN43969166/index.html - Third Party Advisory | |
| References | () http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html - Third Party Advisory, VDB Entry | |
| References | () http://www.openwall.com/lists/oss-security/2022/04/12/6 - Mailing List, Third Party Advisory | |
| References | () https://cwiki.apache.org/confluence/display/WW/S2-061 - Vendor Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20210115-0005/ - Patch, Third Party Advisory | |
| References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
03 Jun 2022, 16:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MLIST) http://www.openwall.com/lists/oss-security/2022/04/12/6 - Mailing List, Third Party Advisory | |
| References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Third Party Advisory | |
| CPE | cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.0:*:*:*:*:*:*:* |
20 Apr 2022, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Apr 2022, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Mar 2022, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:* cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:* |
07 Feb 2022, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Dec 2021, 18:12
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210115-0005/ - Patch, Third Party Advisory | |
| References | (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory | |
| References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory | |
| References | (MISC) https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
| References | (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
| CPE | cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:hospitality_opera_5:5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:* |
20 Oct 2021, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-917 | |
| References |
|
14 Jun 2021, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2020-12-11 02:15
Updated : 2025-10-22 00:17
NVD link : CVE-2020-17530
Mitre link : CVE-2020-17530
CVE.ORG link : CVE-2020-17530
JSON object : View
Products Affected
oracle
- financial_services_data_integration_hub
- hospitality_opera_5
- business_intelligence
- communications_policy_management
- communications_diameter_intelligence_hub
- communications_pricing_design_center
- mysql_enterprise_monitor
apache
- struts
CWE
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
