Apache Struts vulnerable to remote arbitrary command execution due to improper input validation
Critical severity
GitHub Reviewed
Published
Oct 18, 2018
to the GitHub Advisory Database
•
Updated Jul 25, 2024
Package
Affected versions
>= 2.3.0, <= 2.3.31
>= 2.5.0, <= 2.5.10
Patched versions
2.3.32
2.5.10.1
Description
Published by the National Vulnerability Database
Mar 11, 2017
Published to the GitHub Advisory Database
Oct 18, 2018
Reviewed
Jun 16, 2020
Last updated
Jul 25, 2024
Apache Struts versions prior to 2.3.32 and 2.5.10.1 contain incorrect exception handling and error-message generation during file-upload attempts using the Jakarta Multipart parser, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
References