Apache Struts file upload logic is flawed
Critical severity
GitHub Reviewed
Published
Dec 11, 2024
to the GitHub Advisory Database
•
Updated Dec 20, 2024
Description
Published by the National Vulnerability Database
Dec 11, 2024
Published to the GitHub Advisory Database
Dec 11, 2024
Reviewed
Dec 11, 2024
Last updated
Dec 20, 2024
File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 .
References