Remote Code Execution (RCE) Affecting org.apache.struts:struts2-core package, versions [,2.5.33) [6.0.0,6.3.0.2)
Threat Intelligence
Exploit Maturity
Mature
EPSS
13.12% (96th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESTRUTS-6102825
- published 7 Dec 2023
- disclosed 7 Dec 2023
- credit Steven Seeley
Introduced: 7 Dec 2023
CVE-2023-50164 Open this link in a new tabHow to fix?
Upgrade org.apache.struts:struts2-core
to version 2.5.33, 6.3.0.2 or higher.
Overview
org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language.
Affected versions of this package are vulnerable to Remote Code Execution (RCE) via manipulation of file upload parameters that enable path traversal. Under certain conditions, uploading of a malicious file is possible, which may then be executed on the server.
CVSS Scores
version 3.1