Researchers warn that threat actors are attempting to exploit a recently disclosed Apache Struts vulnerability CVE-2024-53677.
Researchers warn that threat actors are attempting to exploit the vulnerability CVE-2024-53677 (CVSS score of 9.5) in Apache Struts. A remote attacker could exploit this vulnerability to upload malicious files, potentially leading to arbitrary code execution.
“An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.” reads the advisory published by Apache.
The vulnerability impacts the following software versions:
- Struts 2.0.0 through Struts 2.3.37 (EOL)
- Struts 2.5.0 through Struts 2.5.33 (EOL)
- Struts 6.0.0 through Struts 6.3.0.2
SANS Technology senior researcher Dr. Johannes Ullrich explained that the vulnerability allows attackers to achieve path traversal and remote code execution via file upload exploitation. The expert explained that the root cause of the issue is an incomplete fix for another vulnerability tracked as CVE-2023-50164.
The researcher also confirmed that threat actors are actively exploiting a publicly-released proof-of-concept (PoC) code.
“The vulnerability, CVE-2024-53677, appears to be related to CVE-2023-50164. The older vulnerability is similar, and an incomplete patch may have led to the newer issue.” wrote Ullrich. “PoC exploits have been released (see, for example, [2]). And we are seeing active exploit attempts for this vulnerability that match the PoC exploit code.”
Users are recommended to upgrade to the latest version Struts 6.4.0 or greater and use Action File Upload Interceptor.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Apache)