Apache.Struts.File.Upload.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Path Traversal vulnerability in Apache Struts.
The vulnerability is caused error handling issue when the application handles a malicious HTTP multipart request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.

description-logoOutbreak Alert

FortiGuard Labs has detected on-going exploit attempts targeting a recently patched Apache Struts 2 vulnerability. Attackers can manipulate file upload parameters to enable path traversal, potentially leading to malicious file upload. This may result in Remote Code Execution, allowing attackers to run arbitrary code, steal data, or compromise entire systems.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Apache Struts from 2.0.0 to Struts 2.3.37 (EOL)
Apache Struts from 2.5.0 to Struts 2.5.33 (EOL)
Apache Struts from 6.0.0 to Struts 6.3.0.2

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://cwiki.apache.org/confluence/display/WW/S2-066
https://cwiki.apache.org/confluence/display/WW/S2-067

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2025-03-25 31.976
Modified
Sig Added
2024-12-31 29.929
Modified
Sig Added
2024-06-27 28.816
Modified
Sig Added
2024-01-04 26.708
Modified
Sig Added
2023-12-20 26.700
Modified
Default_action:pass:drop
2023-12-18 26.698
New