XWork < 2.0.11.2 - 'ParameterInterceptor' Class OGNL Security Bypass
Author: Meder Kydyraliev
type: remote
platform: multiple
port:
date_added: 2008-11-04
date_updated: 2014-03-28
verified: 1
codes: CVE-2008-6504;OSVDB-49732
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/32101/info
XWork is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input.
Attackers can exploit this issue to manipulate server-side context objects with the privileges of the user running the application. Successful exploits can compromise the application and possibly the underlying computer.
Versions prior to XWork 2.0.6 are vulnerable. Struts 2.0.0 through 2.0.11.2 contain vulnerable versions of XWorks and are therefore also affected.
To set #session.user to '0wn3d':
('\u0023' + 'session[\'user\']')(unused)=0wn3d