Skip to main content

CVE-2021-31805

Description

The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.

NVD
Severity: CRITICAL
CVE ID: CVE-2021-31805
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2021-31805
pyroxenites

远程代码执行S2-062 CVE-2021-31805验证POC

Refrence: GitHub

Wrin9

S2-062 (CVE-2021-31805) / S2-061 / S2-059 RCE

Refrence: GitHub

Axx8

Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell

Refrence: GitHub

jax7sec

Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用

Refrence: GitHub

aeyesec

PoC for CVE-2021-31805 (Apache Struts2)

Refrence: GitHub

fleabane1

Apache Struts2 S2-062(CVE-2021-31805)远程代码执行批量检测(无利用)

Refrence: GitHub

z92g

S2-061/S2-062 Struts2 远程命令执行漏洞 POC&EXP

Refrence: GitHub

nth347

Vulnerable environment of CVE-2021-31805 (S2-062) for testing

Refrence: GitHub