ghsa-43mq-6xmg-29vm
Vulnerability from github
Published
2024-12-11 18:30
Modified
2024-12-20 18:35
Severity ?
Summary
Apache Struts file upload logic is flawed
Details
File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 .
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.struts:struts2-core" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "6.4.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-53677" ], "database_specific": { "cwe_ids": [ "CWE-22", "CWE-434" ], "github_reviewed": true, "github_reviewed_at": "2024-12-11T22:02:54Z", "nvd_published_at": "2024-12-11T16:15:14Z", "severity": "CRITICAL" }, "details": "File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067 .", "id": "GHSA-43mq-6xmg-29vm", "modified": "2024-12-20T18:35:08Z", "published": "2024-12-11T18:30:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53677" }, { "type": "WEB", "url": "https://cwiki.apache.org/confluence/display/WW/S2-067" }, { "type": "PACKAGE", "url": "https://github.com/apache/struts" }, { "type": "WEB", "url": "https://struts.apache.org/core-developers/file-upload" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red", "type": "CVSS_V4" } ], "summary": "Apache Struts file upload logic is flawed" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.