logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2017-5638: Apache Struts Remote Code Execution | Cloud Foundry

Description

# # **Severity** Advisory/Critical # **Vendor** Apache # **Versions Affected** * Apache Struts 2: * 2.3.x versions prior to 2.3.32 * 2.5.x versions prior to 2.5.10.1 # **Description** The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 [1] mishandles file upload, which allows remote attackers to execute arbitrary commands via a `#cmd=` string in a crafted Content-Type HTTP header, as exploited in the wild in March 2017 [2]. # **Affected Cloud Foundry Products and Versions** * The Cloud Foundry team has determined that core releases do not package Apache Struts. * However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [3]. # **Mitigation** * The Cloud Foundry team has determined that the project is not exposed to this particular vulnerability and therefore does not require any Cloud Foundry-specific upgrades. * However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [3]. # **Credit** Nike Zheng # **References** * [1] [https://vulners.com/cve/CVE-2017-5638](<https://vulners.com/cve/CVE-2017-5638>) * [2] [https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/](<https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/>) * [3] [https://cwiki.apache.org/confluence/display/WW/S2-045?from=timeline&isappinstalled=0](<https://cwiki.apache.org/confluence/display/WW/S2-045?from=timeline&isappinstalled=0>)


Related