CVE-2011-3923
Description
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Struts before 2.3.1.2 allows remote code execution via OGNL expression injection through the ParametersInterceptor, bypassing security protections.
CVE-2011-3923 is a remote command execution vulnerability in Apache Struts 2 before version 2.3.1.2. The root cause lies in the ParametersInterceptor's insufficient filtering of OGNL expression syntax. Specifically, the interceptor's regular expression whitelist allowed parentheses in parameter names, which OGNL interprets as expression evaluation: (top['foo'])(0) is treated as evaluating the value of parameter foo as an OGNL expression. This enables an attacker to inject arbitrary OGNL statements into any exposed String action parameter, bypassing previous fixes for S2-003 and S2-005 [3][4].
Exploitation requires no authentication and can be carried out over HTTP by sending a crafted request with a malicious OGNL expression in a parameter value and using parentheses in the parameter name to trigger evaluation. For example, a request like ?foo=&(foo)('meh')= causes the value of foo to be evaluated as an OGNL expression, allowing the attacker to call arbitrary methods and execute system commands [3][4]. The vulnerability affects all Struts 2 versions from 2.0.0 through 2.3.1.1 [3].
A successful attack grants the attacker the ability to execute arbitrary commands on the server with the privileges of the Struts application process. This can lead to full compromise of the web server and potentially the underlying system. The impact is rated as critical, with a CVSS v2 score of 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) [2][3].
Users must upgrade to Apache Struts 2.3.1.2 or later. For systems that cannot be upgraded, the official advisory recommends manually applying configuration changes to further restrict parameter names [3]. This CVE is referenced as a known exploited vulnerability and has been leveraged in attacks against applications such as Shopizer [1][4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.struts:struts2-coreMaven | >= 2.0.0, < 2.3.1.2 | 2.3.1.2 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- www.exploit-db.com/exploits/24874mitreexploitx_refsource_EXPLOIT-DB
- github.com/advisories/GHSA-j68f-8h6p-9h5qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2011-3923ghsaADVISORY
- blog.o0o.nu/2012/01/cve-2011-3923-yet-another-struts2.htmlghsaWEB
- seclists.org/fulldisclosure/2014/Jul/38mitrex_refsource_MISC
- struts.apache.org/development/2.x/docs/s2-009.htmlghsaWEB
- www.securityfocus.com/bid/51628mitrevdb-entryx_refsource_BID
- www.securitytracker.com/idmitrex_refsource_MISC
- bugzilla.redhat.com/show_bug.cgighsax_refsource_MISCWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/72585ghsavdb-entryx_refsource_XFWEB
- security-tracker.debian.org/tracker/CVE-2011-3923ghsax_refsource_MISCWEB
- web.archive.org/web/20140725074137/http://seclists.org/fulldisclosure/2014/Jul/38ghsaWEB
News mentions
0No linked articles in our index yet.