Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-53677

Description

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.This issue affects Apache Struts: from 2.0.0 before 6.4.0.Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

POC

Reference

No PoCs from references.

Github

- https://github.com/0xPThree/struts_cve-2024-53677

- https://github.com/0xdeviner/CVE-2024-53677

- https://github.com/20142995/nuclei-templates

- https://github.com/BuludX/CVE-2024-53677

- https://github.com/Cythonic1/CVE-2024-53677-POC

- https://github.com/EQSTLab/CVE-2024-53677

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/NonitBajaj/Burp_Suite

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Q0LT/VM-CVE-2024-53677

- https://github.com/SeanRickerd/CVE-2024-53677

- https://github.com/TAM-K592/CVE-2024-53677-S2-067

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/CVE

- https://github.com/XiaomingX/CVE-2024-53677-S2-067

- https://github.com/Y4tacker/JavaSec

- https://github.com/a1batr0ssG/VulhubExpand

- https://github.com/botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study

- https://github.com/c4oocO/CVE-2024-53677-Docker

- https://github.com/cloudwafs/s2-067-CVE-2024-53677

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread

- https://github.com/endorlabs/struts-workshop

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/hopsypopsy8/CVE-2024-53677-Exploitation

- https://github.com/hopsypopsy8/hopsypopsy8

- https://github.com/ileisd/CiberSeg-Estudi

- https://github.com/jjyj2302/Struts2-CVE

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/punitdarji/Apache-struts-cve-2024-53677

- https://github.com/r007sec/CVE-2024-53677

- https://github.com/saad0x1/Exploits

- https://github.com/shishirghimir/CVE-2024-53677-Exploit

- https://github.com/yangyanglo/CVE-2024-53677

- https://github.com/zhanpengliu-tencent/medium-cve

- https://github.com/zulloper/cve-poc