Apache.Struts.File.Upload.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Paths Traversal vulnerability in Apache Struts.
The vulnerability is caused error handling issue when the application handles a malicious HTTP multipart request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.

description-logoOutbreak Alert

FortiGuard Labs has detected on-going exploit attempts targeting a recently patched Apache Struts 2 vulnerability. Attackers can manipulate file upload parameters to enable path traversal, potentially leading to malicious file upload. This may result in Remote Code Execution, allowing attackers to run arbitrary code, steal data, or compromise entire systems.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Apache Struts from 2.0.0 to Struts 2.3.37 (EOL)
Apache Struts from 2.5.0 to Struts 2.5.32
Apache Struts from 6.0.0 to Struts 6.3.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://cwiki.apache.org/confluence/display/WW/S2-066

Version Updates

Date Version Status Detail
2023-12-29 0.00366
New