CVE-2017-5638: Apache Struts Remote Code Execution
Severity
Advisory/Critical
Vendor
Apache
Versions Affected
- Apache Struts 2:
- 2.3.x versions prior to 2.3.32
- 2.5.x versions prior to 2.5.10.1
Description
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 [1] mishandles file upload, which allows remote attackers to execute arbitrary commands via a #cmd=
string in a crafted Content-Type HTTP header, as exploited in the wild in March 2017 [2].
Affected Cloud Foundry Products and Versions
- The Cloud Foundry team has determined that core releases do not package Apache Struts.
- However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [3].
Mitigation
- The Cloud Foundry team has determined that the project is not exposed to this particular vulnerability and therefore does not require any Cloud Foundry-specific upgrades.
- However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [3].
Credit
Nike Zheng