### [CVE-2013-1966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1966) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. ### POC #### Reference - http://struts.apache.org/development/2.x/docs/s2-013.html - https://cwiki.apache.org/confluence/display/WW/S2-013 #### Github - https://github.com/0day666/Vulnerability-verification - https://github.com/20142995/Goby - https://github.com/20142995/pocsuite3 - https://github.com/ARPSyndicate/cvemon - https://github.com/HimmelAward/Goby_POC - https://github.com/SexyBeast233/SecBooks - https://github.com/Z0fhack/Goby_POC - https://github.com/Zero094/Vulnerability-verification - https://github.com/fupinglee/Struts2_Bugs - https://github.com/ice0bear14h/struts2scan - https://github.com/snic-nsc/cvechecker - https://github.com/snic-nsc/esgf_scanner - https://github.com/sourcery-ai-bot/Deep-Security-Reports - https://github.com/superlink996/chunqiuyunjingbachang - https://github.com/woods-sega/woodswiki