Lucene search

K
saintSAINT CorporationSAINT:5FFE46B76C6892DB5C15655882B0A5F8
HistoryDec 20, 2023 - 12:00 a.m.

Apache Struts file upload directory traversal

2023-12-2000:00:00
SAINT Corporation
my.saintcorporation.com
55
apache struts
directory traversal
vulnerability
remote attackers
file upload
command execution
upgrade
struts 2.5.33
6.3.0.2
tomcat

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.09

Percentile

94.6%

Added: 12/20/2023

Background

Apache Struts is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model-view-controller (MVC) architecture.

Problem

A directory traversal vulnerability in Apache Struts allows remote attackers to upload files to arbitrary locations, leading to command execution.

Resolution

Upgrade to Struts 2.5.33 or 6.3.0.2 or higher.

References

<https://cwiki.apache.org/confluence/display/WW/S2-066&gt;
<https://www.vicarius.io/vsociety/posts/apache-struts-rce-cve-2023-50164&gt;

Limitations

The vulnerability can only be exploited if a Struts application allows file uploads. This exploit only works if Struts is running on Tomcat.

On success, this exploit creates a sntxp web application which must be manually removed from the target.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

EPSS

0.09

Percentile

94.6%