Cloud Foundry Logo
blog single gear
Security Advisory

CVE-2017-5638: Apache Struts Remote Code Execution

CVE-2017-5638: Apache Struts Remote Code Execution

Severity

Advisory/Critical

Vendor

Apache

Versions Affected

  • Apache Struts 2:
    • 2.3.x versions prior to 2.3.32
    • 2.5.x versions prior to 2.5.10.1

Description

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 [1] mishandles file upload, which allows remote attackers to execute arbitrary commands via a #cmd= string in a crafted Content-Type HTTP header, as exploited in the wild in March 2017 [2].

Affected Cloud Foundry Products and Versions

  • The Cloud Foundry team has determined that core releases do not package Apache Struts.
  • However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [3].

Mitigation

  • The Cloud Foundry team has determined that the project is not exposed to this particular vulnerability and therefore does not require any Cloud Foundry-specific upgrades.
  • However, particular applications deployed on Cloud Foundry may depend on Apache Struts 2. This vulnerability should be mitigated on the application level as soon as possible by following the steps outlined in the Struts documentation [3].

Credit

Nike Zheng

References

Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR

SEE ALL ARTICLES