### [CVE-2013-2115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2115) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966. ### POC #### Reference - http://struts.apache.org/development/2.x/docs/s2-014.html - https://cwiki.apache.org/confluence/display/WW/S2-014 #### Github - https://github.com/0day666/Vulnerability-verification - https://github.com/SexyBeast233/SecBooks - https://github.com/Zero094/Vulnerability-verification - https://github.com/sourcery-ai-bot/Deep-Security-Reports - https://github.com/woods-sega/woodswiki