Article Details

Scrape Timestamp (UTC): 2023-12-12 05:26:39.510

Source: https://thehackernews.com/2023/12/new-critical-rce-vulnerability.html

Original Article Text

Click to Toggle View

New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now. Apache has released a security advisory warning of a critical security flaw in the Struts 2 open-source web application framework that could result in remote code execution. Tracked as CVE-2023-50164, the vulnerability is rooted in a flawed "file upload logic" that could enable unauthorized path traversal and could be exploited under the circumstances to upload a malicious file and achieve execution of arbitrary code. Struts is a Java framework that uses the Model-View-Controller (MVC) architecture for building enterprise-oriented web applications. Steven Seeley of Source Incite has been credited with discovering and reporting the flaw, which impacts the following versions of the software - Patches for the bug are available in versions 2.5.33 and 6.3.0.2 or greater. There are no workarounds that remediate the issue. "All developers are strongly advised to perform this upgrade," the project maintainers said in an advisory posted last week. "This is a drop-in replacement and upgrade should be straightforward." While there is no evidence that the vulnerability is being maliciously exploited in real-world attacks, a prior security flaw in the software (CVE-2017-5638, CVSS score: 10.0) was weaponized by threat actors to breach consumer credit reporting agency Equifax in 2017.

Daily Brief Summary

MALWARE // Critical Remote Code Execution Vulnerability in Apache Struts

Apache Struts 2, a popular open-source web application framework, has a critical remote code execution vulnerability identified as CVE-2023-50164.

The flaw exists due to improper "file upload logic," allowing unauthorized path traversal and the potential to upload and execute a malicious file.

Steven Seeley of Source Incite reported this vulnerability which affects Struts 2 versions prior to 2.5.33 and 6.3.0.2.

The Apache Software Foundation has released patches for the vulnerability and there are no alternative workarounds to fix the issue.

Developers using Struts 2 are strongly advised to apply the patch immediately, as the upgrade process is touted as a "drop-in replacement" and should be straightforward.

While there are no reports of this vulnerability being exploited in the wild, similar past vulnerabilities have led to significant breaches, such as the Equifax incident in 2017.