QID 376540

Date Published: 2022-04-13

QID 376540: Apache Struts2 Remote Code Execution (RCE) Vulnerability (S2-062) (Tomcat Server Authentication Record)

Apache Struts is an open-source Model-View-Controller (MVC) framework for creating elegant, modern Java web applications.

A flaw was found in the Apache Struts frameworks. When forced some of the tags attributes perform a double evaluation if a developer applies forced OGNL evaluation by using the %{...} syntax. Using a forced OGNL evaluation on untrusted user input allows an attacker to perform remote code execution and security degradation.

Affected Versions:
Apache Struts 2.5.29 and prior

QID Detection Logic (Authenticated):
This QID gets Tomcat location from Tomcat server authentication record and searches for struts-core.x.jar file under sub directories. It extracts the version from .jar file and compares with vulnerable Struts versions.

An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code on the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution

    Customers are advised to upgrade Apache Struts 2.5.30 Please refer to the S2-061 advisory for more information pertaining to this vulnerability.

    CVEs related to QID 376540

    Software Advisories
    Advisory ID Software Component Link
    S2-062 URL Logo cwiki.apache.org/confluence/display/WW/S2-062