Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-53677— Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks

EPSS 93.07% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-53677

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks
Source: NVD (National Vulnerability Database)
Vulnerability Description
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Struts 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Struts是美国阿帕奇(Apache)基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。 Apache Struts 2.0.0版本至6.4.0之前版本存在安全漏洞,该漏洞源于文件上传逻辑缺陷。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Struts 2.0.0 ~ 6.4.0 -

II. Public POCs for CVE-2024-53677

#POC DescriptionSource LinkShenlong Link
1s2-067(CVE-2024-53677)https://github.com/cloudwafs/s2-067-CVE-2024-53677POC Details
2A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.https://github.com/TAM-K592/CVE-2024-53677-S2-067POC Details
3Nonehttps://github.com/yangyanglo/CVE-2024-53677POC Details
4A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. https://github.com/c4oocO/CVE-2024-53677-DockerPOC Details
5A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.https://github.com/XiaomingX/CVE-2024-53677-S2-067POC Details
6Nonehttps://github.com/dustblessnotdust/CVE-2024-53677-S2-067-threadPOC Details
7Nonehttps://github.com/0xdeviner/CVE-2024-53677POC Details
8Struts Vulnerability - CVE-2024-53677https://github.com/Q0LT/VM-CVE-2024-53677POC Details
9Proof-of-Concept for CVE-2024-46538https://github.com/EQSTLab/CVE-2024-53677POC Details
10Nonehttps://github.com/0xPThree/struts_cve-2024-53677POC Details
11Nonehttps://github.com/punitdarji/Apache-struts-cve-2024-53677POC Details
12Vulnerable Environment and Exploit for CVE-2024-53677https://github.com/SeanRickerd/CVE-2024-53677POC Details
13Apache Struts CVE-2024-53677 Exploitationhttps://github.com/hopsypopsy8/CVE-2024-53677-ExploitationPOC Details
14Nonehttps://github.com/shishirghimir/CVE-2024-53677-ExploitPOC Details
15Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts%20S2-067%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-53677.mdPOC Details
16CVE-2024-53677https://github.com/BuludX/CVE-2024-53677POC Details
17Nonehttps://github.com/r007sec/CVE-2024-53677POC Details
18a proof of concept of CVE-2024-53677https://github.com/Cythonic1/CVE-2024-53677-POCPOC Details
19CVE-2024-53677 관련 컨설턴트용 툴 개발https://github.com/seoyoung-kang/CVE-2024-53677POC Details
20Nonehttps://github.com/MartinxMax/CVE-2024-53677POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-53677

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-53677

No comments yet


Leave a comment