Description
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h4v9-jf2r-9h6m | Cross-Site Request Forgery in Apache Struts |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T13:03:27.319Z
Reserved: 2014-10-03T00:00:00.000Z
Link: CVE-2014-7809
No data.
Status : Modified
Published: 2014-12-10T15:59:01.347
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-7809
OpenCVE Enrichment
No data.
Github GHSA