2023天天弄国产大片_男人的天堂v在线播放_精品久久这里_久久久无码国产精精品免费国国产欧美日本韩高清视频一区二区三区免费式_成全视频免费观看在线下载

Service Notices

All Notices > Security Notices > Apache Struts FileUploadInterceptor Remote Code Execution Vulnerability (CVE-2024-53677)

Apache Struts FileUploadInterceptor Remote Code Execution Vulnerability (CVE-2024-53677)

Dec 13, 2024 GMT+08:00

I. Overview

Recently, Apache Struts has released a security notice, disclosing a remote code execution vulnerability (CVE-2024-53677) in specific versions of Apache Struts. The vulnerability arises from a defect in the file upload logic. If FileUploadInterceptor is utilized in the code, attackers can manipulate file upload parameters to enable path traversal. Under some circumstances, attackers can upload malicious files to exploit the vulnerability, leading to remote code execution. 

Apache Struts is a popular Java web application framework. If you are an Apache Struts user, check your versions and implement timely security hardening.

Reference:

https://cwiki.apache.org/confluence/display/WW/S2-067

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

Struts 2.0.0 - Struts 2.3.37 (EOL)

Struts 2.5.0 - Struts 2.5.33

Struts 6.0.0 - Struts 6.3.0.2

Secure versions:

Apache Struts >= 6.4.0

IV. Vulnerability Handling

A new official version has been released to address this vulnerability. Upgrade to this secure version and use the Action File Upload Interceptor to ensure safety.

https://github.com/apache/struts/releases

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.