Логотип exploitDog
bind:CVE-2024-53677
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-53677

Количество 4

Количество 4

redhat логотип

CVE-2024-53677

около 1 года назад

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

CVSS3: 9
EPSS: Высокий
nvd логотип

CVE-2024-53677

около 1 года назад

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-43mq-6xmg-29vm

около 1 года назад

Apache Struts file upload logic is flawed

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2024-11084

около 1 года назад

Уязвимость механизма File Upload программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

CVSS3: 9
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-53677

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

CVSS3: 9
89%
Высокий
около 1 года назад
nvd логотип
CVE-2024-53677

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

CVSS3: 9.8
89%
Высокий
около 1 года назад
github логотип
GHSA-43mq-6xmg-29vm

Apache Struts file upload logic is flawed

CVSS3: 9.8
89%
Высокий
около 1 года назад
fstec логотип
BDU:2024-11084

Уязвимость механизма File Upload программной платформы Apache Struts, позволяющая нарушителю выполнить произвольный код

CVSS3: 9
89%
Высокий
около 1 года назад

Уязвимостей на страницу