Queue the Jaws theme music! This early remote-code-execution vulnerability in Apache Struts from 2012 happens to describe exactly the underlying cause of the 2017 Struts Disaster: an overly powerful and flexible exception handler based on OGNL ("Object Graph Navigation Library") that ran when Struts encountered bad data types.
When we say "bad data type" we mean something like this: Content-Type: (#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class))
A very bad data type, indeed!
Stay on top of the real risk of open source at any time.
Avoid false positives and get sophisticated upgrade guidance based on risk, compatibility and popularity.More on Continuous Protection
Detect and defend against known-vulnerabilities at runtime. The only SCA to do so.
The quickest way to respond to an imminent threat like log4j with CVE-2021-44228.More on Run-time Protection
CodeGreen is an early-warning defence for your in-house development and integrates directly into GitHub and BitBucketMore on BitBucket and Github apps