New RCE Flaw in Apache Struts Discovered

PUBLISHED:
23 August 2018

New RCE Flaw in Apache Struts Discovered

Security researchers have discovered a critical remote code execution vulnerability in the popular Apache Struts web application framework that could allow remote attackers to run malicious code on the affected servers.

By exploiting this vulnerability, it is possible to perform an RCE attack when namespace value isn’t set for a result defined in underlying configurations and in the same time, its upper action(s) configurations have no or wildcard namespace. The same possibility when using url tag which doesn’t have value and action set and in the same time, its upper action(s) configurations have no or wildcard namespace.

Affected Versions

  • Struts 2.3 – Struts 2.3.34
  • Struts 2.5 – Struts 2.5.16
  • The unsupported Struts versions may be also affected.

Recommended Course of Action

Upgrade to Struts 2.3.35 or Struts 2.5.17

More Information

https://cwiki.apache.org/confluence/display/WW/S2-057

 

9 March 2023 [NO.TCSA : 20230309-1-1-P]

A Critical Code Execution Flaw Found in FortiOS and FortiProxy Administrative Interfaces

READ MORE READ MORE
20 February 2023 [NO.TCSA : 20230220-1-1-P]

Fortinet fixes critical RCE flaws in FortiNAC and FortiWeb

READ MORE READ MORE
16 January 2023 [NO.TCSA : 20230116-1-1-P]

Cacti Crisis: Severe Vulnerability Exploited in the Wild

READ MORE READ MORE
Read More BACK TO THREAT BULLETIN