First published: Thu Dec 07 2023(Updated: )
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Struts 2 | ||
maven/org.apache.struts:struts2-core | >=2.0.0<2.5.33 | 2.5.33 |
maven/org.apache.struts:struts2-core | >=6.0.0<6.3.0.2 | 6.3.0.2 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP7 | |
Apache Struts | >=2.0.0<2.5.33 | |
Apache Struts | >=6.0.0<6.3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50164 is a vulnerability in Apache Struts that allows an attacker to perform Remote Code Execution by manipulating file upload params.
This vulnerability can be exploited by manipulating file upload params to enable path traversal and uploading a malicious file.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.1 or greater to fix this vulnerability.
You can find more information about CVE-2023-50164 on the Apache mailing list, OSS security mailing list, and the NIST vulnerability database.
The Common Weakness Enumeration (CWE) associated with CVE-2023-50164 is CWE-552: Files or Directories Accessible to External Parties.