{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2012-01-08T15:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"18329","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"http://www.exploit-db.com/exploits/18329"},{"name":"20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://struts.apache.org/2.x/docs/version-notes-2311.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://struts.apache.org/2.x/docs/s2-008.html"},{"tags":["x_refsource_MISC"],"url":"https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.apache.org/jira/browse/WW-3668"},{"name":"47393","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/47393"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2012-0391","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"18329","refsource":"EXPLOIT-DB","url":"http://www.exploit-db.com/exploits/18329"},{"name":"20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html"},{"name":"http://struts.apache.org/2.x/docs/version-notes-2311.html","refsource":"CONFIRM","url":"http://struts.apache.org/2.x/docs/version-notes-2311.html"},{"name":"http://struts.apache.org/2.x/docs/s2-008.html","refsource":"CONFIRM","url":"http://struts.apache.org/2.x/docs/s2-008.html"},{"name":"https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt","refsource":"MISC","url":"https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt"},{"name":"https://issues.apache.org/jira/browse/WW-3668","refsource":"CONFIRM","url":"https://issues.apache.org/jira/browse/WW-3668"},{"name":"47393","refsource":"SECUNIA","url":"http://secunia.com/advisories/47393"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T18:23:31.000Z"},"title":"CVE Program Container","references":[{"name":"18329","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"http://www.exploit-db.com/exploits/18329"},{"name":"20120105 SEC Consult SA-20120104-0 :: Multiple critical vulnerabilities in Apache Struts2","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2012-01/0031.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://struts.apache.org/2.x/docs/version-notes-2311.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://struts.apache.org/2.x/docs/s2-008.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.sec-consult.com/files/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.apache.org/jira/browse/WW-3668"},{"name":"47393","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/47393"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2012-0391","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-10T20:07:52.407977Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-01-21","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0391"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-0391","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"timeline":[{"time":"2022-01-21T00:00:00.000Z","lang":"en","value":"CVE-2012-0391 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-22T00:05:48.504Z"}}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2012-0391","datePublished":"2012-01-08T15:00:00.000Z","dateReserved":"2012-01-08T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:48.504Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}