CVE-2024-53677: Apache Struts file upload logic is flawed
(updated )
File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 .
References
- cwiki.apache.org/confluence/display/WW/S2-067
- github.com/advisories/GHSA-43mq-6xmg-29vm
- github.com/apache/struts
- github.com/apache/struts/commit/1ecfbae46543a83e131404f8dcc84b3d0d554854
- github.com/apache/struts/commit/3ef9ade8902a63bb560892453eeca02bfddefc78
- github.com/apache/struts/commit/930fef7679d7247db9e460c146b1698a9d7ad1e4
- nvd.nist.gov/vuln/detail/CVE-2024-53677
- security.netapp.com/advisory/ntap-20250103-0005
- struts.apache.org/core-developers/file-upload
- www.dynatrace.com/news/blog/the-anatomy-of-broken-apache-struts-2-a-technical-deep-dive-into-cve-2024-53677
Code Behaviors & Features
Detect and mitigate CVE-2024-53677 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →