Software
Service
Insights
Case & Story
Dev Platform
Sign In
Public Notices
Apache Struts Remote Code Execution Vulnerability (CVE-2024-53677)
Dec. 13, 2024 GMT+08:00
1.Overview

Recently, Apache Struts officially released a security notice, disclosing a Remote Code Execution Vulnerability (CVE-2024-53677). An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.

Note:
applications not using FileUploadInterceptor are safe.

Apache Struts 2 is an open-source Java web application framework primarily used for building enterprise-level applications. If you are an Apache Struts 2 user, check your system and implement timely security hardening.

Reference:

https://cwiki.apache.org/confluence/display/WW/S2-067

2.Severity

critical

(Severity: low, medium, important, and critical)

3.Affected Products

Affected versions:

Struts 2.0.0 through Struts 2.3.37 (EOL)

Struts 2.5.0 through Struts 2.5.33 (EOL)

Struts 6.0.0 through Struts 6.3.0.2

Secure versions:

Apache Struts >= 6.4.0

4.Vulnerability Handling

This vulnerability has been fixed in later official versions. If your service version falls into the affected range and uses FileUploadInterceptor, upgrade it to a latest secure version and migrate to the new file upload mechanism.

https://struts.apache.org/download.cgi

https://struts.apache.org/core-developers/file-upload

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.

5.Technical Support

Get more professional support at any time

Contact Us

Email: GlobalTechnicalService@iwhalecloud.com
Contact Us