Security

Patches

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?


A critical security hole in Apache Struts 2 – patched last week – is currently being exploited using publicly available proof-of-concept (PoC) code.

Struts is a Java-based web application framework widely used by large enterprises and government agencies. Bugs in this open source project do not tend to end well – remember the "entirely preventable" Equifax breach in 2017?

The flaw is tracked as CVE-2024-53677, it received a 9.5 out of 10 CVSS risk rating, and it affects Struts versions 2.0.0 to 2.3.37 (end-of-life), 2.5.0 to 2.5.33, and 6.0.0 to 6.3.0.2.

Applications that don't use Struts' File Upload Interceptor component – which was deprecated in version 6.4.0 and removed entirely in 7.0.0 – are safe.

Attackers can exploit the bug to manipulate file upload parameters and enable path traversal. This can be abused to upload malicious files into restricted directories, and can lead to remote code execution (RCE) under certain conditions.

As security intelligence and automation vendor Qualys warned in its advisory, "a vulnerability like CVE-2024-53677 could have far-reaching implications" – such as loss of sensitive data, complete system compromise.

And according to infosec education outfit SANS's dean of research Johannes Ullrich, attackers are actively trying to exploit this vulnerability using this POC code.

"At this point, the exploit attempts are attempting to enumerate vulnerable systems," Ullrich noted.

Or at least, the exploit attempts are "inspired" by this bug – there are at least two vulnerabilities that could be targeted using this code, he added.

Regardless, we'd strongly suggest users update to at least Struts 6.4.0 (or the latest version) immediately. However, as The Register reported last week, that's not a simple job.

Here's what Apache advised in its December 12 disclosure:

This change isn't backward compatible as you must rewrite your actions to start using the new Action File Upload mechanism and related interceptor.

Continuing to use the old File Uploader leaves you vulnerable to the attack.

As Ullrich also pointed out, the new vulnerability – CVE-2024-53677 – seems to be related to CVE-2023-50164, which Apache fixed in December 2023. "The older vulnerability is similar," he wrote, "and an incomplete patch may have led to the newer issue." ®

Send us news
3 Comments

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Crims backdoored the backdoors they supplied to other miscreants. Then the domains lapsed

Here's what $20 gets you these days

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

FireScam infostealer poses as Telegram Premium app to surveil Android devices

Once installed, it helps itself to your data like it's a free buffet