Vulnerability Description
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Struts | >= 2.0.0, < 6.4.0 |
Related Weaknesses (CWE)
References
- https://cwiki.apache.org/confluence/display/WW/S2-067Third Party Advisory
- https://security.netapp.com/advisory/ntap-20250103-0005/Third Party Advisory
FAQ
What is CVE-2024-53677?
CVE-2024-53677 is a vulnerability with a CVSS score of 9.8 (CRITICAL). File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can...
How severe is CVE-2024-53677?
CVE-2024-53677 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-53677?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Struts.