vulnerability:information=remediation
Created on 2024-12-19 05:35 and updated on 2024-12-19 05:38.
Description
Reference - https://attackerkb.com/topics/pe3CCtOE81/cve-2023-50164/rapid7-analysis
Apache Struts is a popular Java web application framework. On December 7, 2023 Apache published an advisory for CVE-2023-50164, a Struts parameter pollution vulnerability that potentially leads to arbitrary file uploads. An attacker with the ability to perform arbitrary file uploads is very likely to be able to leverage this and achieve remote code execution. According to the vendor, the following versions of Struts are affected:
-
Struts 2.0.0 – Struts 2.3.37 (End of Life)
-
Struts 2.5.0 – Struts 2.5.32
-
Struts 6.0.0 – Struts 6.3.0
Several technical analyses on the root cause of the vulnerability have already been done (here, here, and here). Notably, all current public analysis of the vulnerability demonstrates exploitation on a custom made demo web application.
There are currently no known production web applications that are exploitable, although this is likely to change as the vulnerability comes under more scrutiny from researchers, and given the popularity of the Struts framework in enterprise web applications. Several security firms have reported exploitation (here and here), but as of December 15, 2023, it is unclear if the activity being reported actually refers to successful exploitation (i.e., code execution) against one or more known vulnerable targets, or if this is merely highlighting exploit attempts with the existing public PoCs (all of which target a demo application) being sprayed opportunistically at indiscriminate targets.
However, exploitation of this vulnerability will be target-specific based on the differing target action’s endpoints, the naming convention of the expected uploaded file name, and any other target-specific restrictions that may need to be overcome.
Remediation
Vendors who develop applications that use Apache Struts should upgrade to Struts 2.5.33, Struts 6.3.0.2, or greater to remediate CVE-2023-50164.
Associated vulnerability
CVE-2023-50164Related vulnerabilities
Meta
[ { "tags": [ "vulnerability:information=remediation" ] }, { "ref": " https://attackerkb.com/topics/pe3CCtOE81/cve-2023-50164/rapid7-analysis" } ]