logo
DATABASE RESOURCES PRICING ABOUT US

Apache Struts 2 is vulnerable to remote code execution

Description

### Overview Apache Struts, versions 2.3.5 - 2.3.31 and 2.5 - 2.5.10, is vulnerable to code injection leading to remote code execution (RCE). ### Description [**CWE-94**](<https://cwe.mitre.org/data/definitions/94.html>)**: Improper Control of Generation of Code** \- CVE-2017-5638 An attacker can execute arbitrary OGNL code included in the "Content-Type" header of a file upload. This vulnerability is actively being exploited. --- ### Impact An unauthenticated remote attacker can execute arbitrary commands with the privileges of the user running Apache Struts. --- ### Solution **Apply an update** Update to Apache Struts 2.3.32 or 2.5.10.1 --- If you are unable to update Struts, please see the workaround suggested by Apache [here](<https://cwiki.apache.org/confluence/display/WW/S2-045>). --- ### Vendor Information 834067 Filter by status: All Affected Not Affected Unknown Filter by content: __ Additional information available __ Sort by: Status Alphabetical Expand all **Javascript is disabled. Click here to view vendors.** ### Apache Struts Affected Updated: March 14, 2017 ### Status Affected ### Vendor Statement We have not received a statement from the vendor. ### Vendor Information We are not aware of further vendor information regarding this vulnerability. ### Vendor References * <https://cwiki.apache.org/confluence/display/WW/S2-045> ### CVSS Metrics Group | Score | Vector ---|---|--- Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C Temporal | 8.7 | E:H/RL:OF/RC:C Environmental | 8.7 | CDP:N/TD:H/CR:ND/IR:ND/AR:ND ### References * <https://cwiki.apache.org/confluence/display/WW/S2-045> * <http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html> * <https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/> * <http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/> * <https://github.com/rapid7/metasploit-framework/issues/8064> * <https://www.exploit-db.com/exploits/41570/> * <https://cwe.mitre.org/data/definitions/94.html> ### Acknowledgements This document was written by Trent Novelly. ### Other Information **CVE IDs:** | [CVE-2017-5638](<http://web.nvd.nist.gov/vuln/detail/CVE-2017-5638>) ---|--- **Date Public:** | 2017-03-06 **Date First Published:** | 2017-03-14 **Date Last Updated: ** | 2017-03-14 21:02 UTC **Document Revision: ** | 9


Related