Vulnerability Name: CVE-2020-17530 (CCN-192743) Assigned: 2020-12-08 Published: 2020-12-08 Updated: 2022-06-03 Summary: Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )9.1 Critical (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H )7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-917 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2020-17530 Source: CCN Type: JVN#43969166Apache Struts 2 vulnerable to remote code execution (S2-061) Source: JVN Type: Third Party AdvisoryJVN#43969166 Source: MISC Type: Third Party Advisory, VDB Entryhttp://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE. Source: CCN Type: Apache Struts 2 Documentation S2-061Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution Source: CONFIRM Type: Vendor Advisoryhttps://cwiki.apache.org/confluence/display/WW/S2-061 Source: XF Type: UNKNOWNapache-struts-cve202017530-code-exec(192743) Source: CCN Type: Packet Storm Security [12-24-2020]Apache Struts 2 Forced Multi OGNL Evaluation Source: CONFIRM Type: Patch, Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20210115-0005/ Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCYKNOWN EXPLOITED VULNERABILITIES CATALOG Source: CCN Type: IBM Security Bulletin 6406954 (Tivoli Application Dependency Discovery Manager)Vulnerability in Apache Struts affects IBM Tivoli Application Dependency Discovery Manager (CVE-2020-17530) Source: CCN Type: IBM Security Bulletin 6427953 (Tivoli Netcool/OMNIbus_GUI)Multiple vulnerabilities is affecting Tivoli Netcool/OMNIbus WebGUI (CVE-2021-20336, CVE-2020-17530) Source: CCN Type: IBM Security Bulletin 6434139 (Spectrum Symphony)Vulnerability in Apache Struts framework affects IBM Spectrum Symphony Source: CCN Type: IBM Security Bulletin 6443719 (Security Guardium)IBM Security Guardium is affected by multiple vulnerabilities (CVE-2020-17530, CVE-2020-1971) Source: CCN Type: IBM Security Bulletin 6565855 (Sterling Order Management)IBM Sterling Order Management Apache Struts vulnerablity Source: CCN Type: IBM Security Bulletin 6593761 (Content Collector)CVE-2020-17530 may affect Apache struts2-core used by Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections Source: CCN Type: IBM Security Bulletin 6593787 (Content Collector)CVE-2020-17530 may affect Apache struts2-core used by Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections Source: CCN Type: IBM Security Bulletin 6593789 (Content Collector)CVE-2020-17530 may affect Apache struts2-core used by Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections Source: CCN Type: IBM Security Bulletin 6593791 (Content Collector)CVE-2020-17530 may affect Apache struts2-core used by Content Collector for Email, Content Collector for File Systems, Content Collector for Microsoft SharePoint and Content Collector for IBM Connections Source: CCN Type: IBM Security Bulletin 6620351 (Call Center for Commerce)IBM Call Center and Apache Struts Struts upgrade strategy (various CVEs, see below) Source: CCN Type: IBM Security Bulletin 6620355 (Sterling Order Management)IBM Sterling Order Management Apache Struts upgrade strategy (various CVEs, see below) Source: CCN Type: IBM Security Bulletin 6831813 (Netcool Operations Insight)Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities. Source: N/A Type: Patch, Third Party AdvisoryN/A Source: CCN Type: Oracle Critical Patch Update Advisory - April 2021Oracle Critical Patch Update Advisory - April 2021 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuApr2021.html Source: CCN Type: Oracle CPUApr2022Oracle Critical Patch Update Advisory - April 2022 Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuapr2022.html Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujan2021.html Source: CCN Type: Oracle CPUJan2022Oracle Critical Patch Update Advisory - January 2022 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujan2022.html Source: CCN Type: Oracle CPUJul2021Oracle Critical Patch Update Advisory - July 2021 Source: CCN Type: Oracle CPUOct2021Oracle Critical Patch Update Advisory - October 2021 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2021.html Source: CCN Type: Rapid7 Vulnerability and Exploit Database [09-14-2020]Apache Struts 2 Forced Multi OGNL Evaluation Vulnerable Configuration: Configuration 1 :cpe:/a:apache:struts:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 2.5.30)Configuration 2 :cpe:/a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:* OR cpe:/a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:* OR cpe:/a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_data_integration_hub:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_data_integration_hub:8.0.3:*:*:*:*:*:*:* OR cpe:/a:oracle:hospitality_opera_5:5.6:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_intelligence_hub:8.2.3:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_intelligence_hub:8.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_intelligence_hub:8.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_intelligence_hub:8.1.0:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:struts:2.0.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.5:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.6:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.9:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.10:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.11:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.11.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.11.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.0:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.12:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.13:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.14:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.4:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.0.7:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.0:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.4:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.5:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.6:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.8:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.1.8.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.2.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.2.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.2.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.13:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.14:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.15.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.2.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.8:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.7:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.4.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.4:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.1.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.1.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.12:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.14.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.14.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.15.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.16:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.15.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.16.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.16.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.16.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.20:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.24:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.24.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.28:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.30:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.5:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.10:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.11:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.12:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.5:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.8:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.10.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.13:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.14:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.14.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.16:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.20.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.20.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.24.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.28.1:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.29:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.31:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.32:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.33:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.34:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.6:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.9:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.10:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.11:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.14.3:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.15:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.17:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.19:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.20.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.21:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.22:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.23:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.24.2:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.25:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.26:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.3.27:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.16:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.4:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.6:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.7:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.9:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.17:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.18:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.19:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.20:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.21:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.22:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.23:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.24:*:*:*:*:*:*:* OR cpe:/a:apache:struts:2.5.25:*:*:*:*:*:*:* AND cpe:/a:ibm:tivoli_netcool/omnibus:8.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:content_collector:4.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:business_intelligence:12.2.1.3.0::~~enterprise~~~:*:*:*:*:* OR cpe:/a:ibm:spectrum_symphony:7.2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:10.5:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_symphony:7.2.1:*:*:*:*:*:*:* OR cpe:/a:oracle:business_intelligence:12.2.1.4.0::~~enterprise~~~:*:*:*:*:* OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:* OR cpe:/a:ibm:content_collector:4.0.0:*:*:*:email:*:*:* OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.3.0.7:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.2:*:*:*:*:*:*:* OR cpe:/a:ibm:tivoli_netcool/omnibus_gui:8.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:11.3:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
apache struts *
oracle business intelligence 12.2.1.3.0
oracle business intelligence 12.2.1.4.0
oracle communications policy management 12.5.0
oracle financial services data integration hub 8.0.6
oracle financial services data integration hub 8.0.3
oracle hospitality opera 5 5.6
oracle communications pricing design center 12.0.0.3.0
oracle mysql enterprise monitor 8.0.23
oracle communications diameter intelligence hub 8.2.3
oracle communications diameter intelligence hub 8.0.0
oracle communications diameter intelligence hub 8.2.0
oracle communications diameter intelligence hub 8.1.0
apache struts 2.0.1
apache struts 2.0.5
apache struts 2.0.6
apache struts 2.0.9
apache struts 2.0.10
apache struts 2.0.11
apache struts 2.0.11.1
apache struts 2.0.11.2
apache struts 2.1
apache struts 2.0.0
apache struts 2.0.12
apache struts 2.0.13
apache struts 2.0.14
apache struts 2.0.2
apache struts 2.0.3
apache struts 2.0.4
apache struts 2.0.7
apache struts 2.1.0
apache struts 2.1.1
apache struts 2.1.2
apache struts 2.1.3
apache struts 2.1.4
apache struts 2.1.5
apache struts 2.1.6
apache struts 2.1.8
apache struts 2.1.8.1
apache struts 2.2.1
apache struts 2.2.1.1
apache struts 2.2.3
apache struts 2.3.1
apache struts 2.3.14.3
apache struts 2.3.13
apache struts 2.3.14
apache struts 2.3.15
apache struts 2.3.15.3
apache struts 2.2.3.1
apache struts 2.3.8
apache struts 2.3.7
apache struts 2.3.4.1
apache struts 2.3.4
apache struts 2.3.3
apache struts 2.3.1.2
apache struts 2.3.1.1
apache struts 2.3.12
apache struts 2.3.14.2
apache struts 2.3.14.1
apache struts 2.3.15.1
apache struts 2.3.16
apache struts 2.3.15.2
apache struts 2.3.16.1
apache struts 2.3.16.2
apache struts 2.3.16.3
apache struts 2.3.20
apache struts 2.3.24
apache struts 2.3.24.1
apache struts 2.3.28
apache struts 2.3.30
apache struts 2.3.5
apache struts 2.5
apache struts 2.5.10
apache struts 2.5.11
apache struts 2.5.12
apache struts 2.5.5
apache struts 2.5.1
apache struts 2.5.2
apache struts 2.5.8
apache struts 2.5.10.1
apache struts 2.5.13
apache struts 2.5.14
apache struts 2.5.14.1
apache struts 2.5.16
apache struts 2.3.20.1
apache struts 2.3.20.3
apache struts 2.3.24.3
apache struts 2.3.28.1
apache struts 2.3.29
apache struts 2.3.31
apache struts 2.3.32
apache struts 2.3.33
apache struts 2.3.34
apache struts 2.3.6
apache struts 2.3.9
apache struts 2.3.10
apache struts 2.3.11
apache struts 2.3.14.3
apache struts 2.3.15
apache struts 2.3.17
apache struts 2.3.19
apache struts 2.3.20.2
apache struts 2.3.21
apache struts 2.3.22
apache struts 2.3.23
apache struts 2.3.24.2
apache struts 2.3.25
apache struts 2.3.26
apache struts 2.3.27
apache struts 2.5.16
apache struts 2.5.4
apache struts 2.5.6
apache struts 2.5.7
apache struts 2.5.9
apache struts 2.5.17
apache struts 2.5.18
apache struts 2.5.19
apache struts 2.5.20
apache struts 2.5.21
apache struts 2.5.22
apache struts 2.5.23
apache struts 2.5.24
apache struts 2.5.25
ibm tivoli netcool/omnibus 8.1.0
ibm content collector 4.0.1
oracle business intelligence 12.2.1.3.0
ibm spectrum symphony 7.2.0.2
ibm security guardium 10.5
ibm spectrum symphony 7.2.1
oracle business intelligence 12.2.1.4.0
ibm security guardium 10.6
ibm content collector 4.0.0
ibm tivoli application dependency discovery manager 7.3.0.7
ibm security guardium 11.0
ibm security guardium 11.1
ibm security guardium 11.2
ibm tivoli netcool/omnibus gui 8.1.0
ibm security guardium 11.3