Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-50164

Опубликовано: 07 дек. 2023
Источник: debian
EPSS Критический

Описание

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javaremovedpackage

Примечания

  • https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj

  • https://cwiki.apache.org/confluence/display/WW/S2-066

EPSS

Процентиль: 100%
0.92864
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
redhat
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
nvd
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
github
около 2 лет назад

Apache Struts vulnerable to path traversal

CVSS3: 9.8
fstec
около 2 лет назад

Уязвимость программной платформы Apache Struts, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.92864
Критический