Apache.Struts.File.Upload.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Path Traversal vulnerability in Apache Struts.
The vulnerability is caused error handling issue when the application handles a malicious HTTP multipart request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.
Outbreak Alert
FortiGuard Labs has detected on-going exploit attempts targeting a recently patched Apache Struts 2 vulnerability. Attackers can manipulate file upload parameters to enable path traversal, potentially leading to malicious file upload. This may result in Remote Code Execution, allowing attackers to run arbitrary code, steal data, or compromise entire systems.
Affected Products
Apache Struts from 2.0.0 to Struts 2.3.37 (EOL)
Apache Struts from 2.5.0 to Struts 2.5.33 (EOL)
Apache Struts from 6.0.0 to Struts 6.3.0.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://cwiki.apache.org/confluence/display/WW/S2-066
https://cwiki.apache.org/confluence/display/WW/S2-067
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |