vendor:
Struts2
by:
Anonymous
N/A
CVSS
N/A
Remote Code Execution
94
CWE
Product Name: Struts2
Affected Version From: Struts 2.3.5 - Struts 2.3.31
Affected Version To: Struts 2.5 - Struts 2.5.10
Patch Exists: YES
Related CWE: CVE-2017-5638
CPE: 2.3:a:apache:struts2
Other Scripts:
N/A
Tags: cve,cve2017,apache,kev,msf,struts,rce
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'html:"Apache Struts"', 'verified': True, 'vendor': 'apache', 'product': 'struts'}
Platforms Tested: Windows, Linux, Mac
2017
Apache Struts2 S2-045
Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string.
Mitigation:
The best way to mitigate this vulnerability is to upgrade to the latest version of Apache Struts2. Additionally, it is recommended to apply the patch provided by the Apache Struts2 team.