Security

Patches

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?


A critical security hole in Apache Struts 2 – patched last week – is currently being exploited using publicly available proof-of-concept (PoC) code.

Struts is a Java-based web application framework widely used by large enterprises and government agencies. Bugs in this open source project do not tend to end well – remember the "entirely preventable" Equifax breach in 2017?

The flaw is tracked as CVE-2024-53677, it received a 9.5 out of 10 CVSS risk rating, and it affects Struts versions 2.0.0 to 2.3.37 (end-of-life), 2.5.0 to 2.5.33, and 6.0.0 to 6.3.0.2.

Applications that don't use Struts' File Upload Interceptor component – which was deprecated in version 6.4.0 and removed entirely in 7.0.0 – are safe.

Attackers can exploit the bug to manipulate file upload parameters and enable path traversal. This can be abused to upload malicious files into restricted directories, and can lead to remote code execution (RCE) under certain conditions.

As security intelligence and automation vendor Qualys warned in its advisory, "a vulnerability like CVE-2024-53677 could have far-reaching implications" – such as loss of sensitive data, complete system compromise.

And according to infosec education outfit SANS's dean of research Johannes Ullrich, attackers are actively trying to exploit this vulnerability using this POC code.

"At this point, the exploit attempts are attempting to enumerate vulnerable systems," Ullrich noted.

Or at least, the exploit attempts are "inspired" by this bug – there are at least two vulnerabilities that could be targeted using this code, he added.

Regardless, we'd strongly suggest users update to at least Struts 6.4.0 (or the latest version) immediately. However, as The Register reported last week, that's not a simple job.

Here's what Apache advised in its December 12 disclosure:

This change isn't backward compatible as you must rewrite your actions to start using the new Action File Upload mechanism and related interceptor.

Continuing to use the old File Uploader leaves you vulnerable to the attack.

As Ullrich also pointed out, the new vulnerability – CVE-2024-53677 – seems to be related to CVE-2023-50164, which Apache fixed in December 2023. "The older vulnerability is similar," he wrote, "and an incomplete patch may have led to the newer issue." ®

Send us news
3 Comments

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew