First published: Tue Dec 05 2023(Updated: )
When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied. Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.struts:struts2-core | <2.5.32 | 2.5.32 |
maven/org.apache.struts:struts2-core | >=6.0.0<6.1.2.2 | 6.1.2.2 |
maven/org.apache.struts:struts2-core | >=6.2.0<6.3.0.1 | 6.3.0.1 |
Apache Struts | >=2.0.0<2.5.32 | |
Apache Struts | >=6.1.2.1<6.3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Apache Struts vulnerability is CVE-2023-41835.
The title of this Apache Struts vulnerability is 'excessive disk usage'.
The description of this Apache Struts vulnerability is that when a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied.
To fix the Apache Struts vulnerability with ID CVE-2023-41835, users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater.
The Common Weakness Enumeration (CWE) ID associated with this Apache Struts vulnerability is CWE-913.