Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-50164

Опубликовано: 07 дек. 2023
Источник: redhat
CVSS3: 9.8

Описание

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

A flaw was found in Apache Struts. Affected versions of this package are vulnerable to Remote Code Execution (RCE) via manipulation of file upload parameters that enable path traversal. Under certain conditions, uploading a malicious file is possible, which may then be executed on the server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2org.apache.struts-struts-coreNot affected
Migration Toolkit for Applications 6org.apache.struts-struts-coreNot affected
Migration Toolkit for Runtimesorg.apache.struts-struts-coreNot affected
OpenShift Serverlessorg.apache.struts-struts-coreNot affected
Red Hat AMQ Broker 7org.apache.struts-struts-coreNot affected
Red Hat build of Apache Camel for Spring Boot 3org.apache.struts-struts-coreNot affected
Red Hat build of Debezium 2org.apache.struts-struts-coreNot affected
Red Hat Build of Keycloakorg.apache.struts-struts-coreNot affected
Red Hat build of OptaPlanner 8org.apache.struts-struts-coreNot affected
Red Hat build of Quarkusorg.apache.struts/struts-coreNot affected

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-552
https://bugzilla.redhat.com/show_bug.cgi?id=2253938Struts: File upload component had a directory traversal vulnerability

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
nvd
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
debian
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversa ...

CVSS3: 9.8
github
около 2 лет назад

Apache Struts vulnerable to path traversal

CVSS3: 9.8
fstec
около 2 лет назад

Уязвимость программной платформы Apache Struts, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю выполнить произвольный код

9.8 Critical

CVSS3

Уязвимость CVE-2023-50164