QID 376540
Date Published: 2022-04-13
QID 376540: Apache Struts2 Remote Code Execution (RCE) Vulnerability (S2-062) (Tomcat Server Authentication Record)
Apache Struts is an open-source Model-View-Controller (MVC) framework for creating elegant, modern Java web applications.
A flaw was found in the Apache Struts frameworks. When forced some of the tags attributes perform a double evaluation if a developer applies forced OGNL evaluation by using the %{...} syntax. Using a forced OGNL evaluation on untrusted user input allows an attacker to perform remote code execution and security degradation.
Affected Versions:
Apache Struts 2.5.29 and prior
QID Detection Logic (Authenticated):
This QID gets Tomcat location from Tomcat server authentication record and searches for struts-core.x.jar file under sub directories. It extracts the version from .jar file and compares with vulnerable Struts versions.
An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code on the system.
Customers are advised to upgrade Apache Struts 2.5.30 Please refer to the S2-061 advisory for more information pertaining to this vulnerability.
CVEs related to QID 376540
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| S2-062 |
|