CVE-2017-5638

Command Injection
Affects
Apache Struts 2
>= 2.3.5 - <2.3.31, >=2.5 - <2.5.10
in
Struts
No items found.
Exclamation circle icon
Patch Available
This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs

Overview

Apache Struts is a popular open-source web application framework for developing Java EE web applications. It provides robust support for creating modern Java-based enterprise applications. 

Command Injection vulnerability (CVE-2017-5638) has been identified in Apache Struts, which allows an attacker to execute arbitrary commands through specially crafted HTTP headers, particularly exploiting a flaw in the file upload handling mechanism.

Per OWASP: Command Injection vulnerability is an attack where an attacker aims to execute arbitrary commands on the host operating system through a vulnerable application. These attacks occur when an application improperly passes untrusted user input (in this case HTTP headers) to a system shell. In such an attack, the commands provided by the attacker are typically executed with the same privileges as the vulnerable application. 

This issue affects multiple versions, at 2.3.x before 2.3.32, at 2.5.x before 2.5.10.1

Details

Module Info

  • Product: Apache Struts
  • Affected packages: struts-core
  • Affected versions: >=2.3.0 <2.3.32, >=2.5.0 <2.5.10.1
  • GitHub repository: https://github.com/apache/struts
  • Package manager: Maven
  • Fixed in: Struts 2.3.32, Struts 2.5.10.1

Vulnerability Info

The vulnerability occurred because some versions Apache Struts were not correctly sanitizing user-controlled input in certain HTTP request headers. Exceptions and error messages were not handled securely during the processing of the file uploads. This vulnerability arose from a flaw in the Jakarta Multipart parser used in Apache Struts to handle file upload requests.  

Mitigation

Users of the affected components should apply one of the following mitigations:

  • Users of affected versions should upgrade to one of the patched versions: Struts 2.3.32, Struts 2.5.10.1
  • Leverage a commercial support partner like HeroDevs for post-EOL security support.

Credit

Vulnerability Details
ID
CVE-2017-5638
PROJECT Affected
Apache Struts 2
Versions Affected
>= 2.3.5 - <2.3.31, >=2.5 - <2.5.10
Published date
March 16, 2017
≈ Fix date
March 16, 2017
Severity
Critical
Category
Command Injection