Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-50164

Опубликовано: 07 дек. 2023
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS3: 9.8

Описание

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

EPSS

Процентиль: 100%
0.92864
Критический

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
nvd
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
debian
около 2 лет назад

An attacker can manipulate file upload params to enable paths traversa ...

CVSS3: 9.8
github
около 2 лет назад

Apache Struts vulnerable to path traversal

CVSS3: 9.8
fstec
около 2 лет назад

Уязвимость программной платформы Apache Struts, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.92864
Критический

9.8 Critical

CVSS3