New critical Apache Struts flaw exploited to find vulnerable servers

Share:

A recently patched critical Apache Struts 2 vulnerability tracked as CVE-2024-53677 is actively exploited using public proof-of-concept exploits to find vulnerable devices.

Apache Struts is an open-source framework for building Java-based web applications used by various organizations, including government agencies, e-commerce platforms, financial institutions, and airlines.

Apache publicly disclosed the Struts CVE-2024-53677 flaw (CVSS 4.0 score: 9.5, “critical”) six days ago, stating it is a bug in the software’s file upload logic, allowing path traversals and the uploading of malicious files that could lead to remote code execution.

It impacts Struts 2.0.0 through 2.3.37 (end-of-life), 2.5.0 through 2.5.33, and 6.0.0 through 6.3.0.2.

“An attacker can manipulate file upload parameters to enable paths traversal, and under some circumstances, this can lead to uploading a malicious file which can be used to perform remote code execution,” reads the Apache security bulletin.

In short, CVE-2024-53677 allows attackers to upload dangerous files like web shells into restricted directors and use them to remotely execute commands, download further payloads, and steal data.

The vulnerability is similar to CVE-2023-50164, and there’s speculation that the same issue has re-emerged due to an incomplete fix, a problem that has previously plagued the project in the past.

ISC SANS’ researcher Johannes Ullrich reports seeing exploitation attempts that appear to use publicly available exploits or are at least heavily inspired by them.

“We are seeing active exploit attempts for this vulnerability that match the PoC exploit code. At this point, the exploit attempts are attempting to enumerate vulnerable systems,” reports Ullrich.

Attackers are enumerating vulnerable systems by using the exploit to upload an “exploit.jsp” file that contains a single line of code to print the “Apache Struts” string.

The exploiter then attempts to access the script to verify that the server was successfully exploited. Ullrich says the exploitation has only been detected from a single IP address, 169.150.226.162.

To mitigate the risk, Apache says users should upgrade to Struts 6.4.0 or later and migrate to the new file upload mechanism.

Merely applying the patch isn’t enough, as the code that handles file uploads in Struts applications needs to be rewritten to implement the new Action File Upload mechanism.

“This change isn’t backward compatible as you must rewrite your actions to start using the new Action File Upload mechanism and related interceptor,” warns Apache.

“Keep using the old File Upload mechanism keeps you vulnerable to this attack.”

With active exploitation underway, multiple national cybersecurity agencies, including those in Canada, Australia, and Belgium, have issued public alerts urging impacted software developers to take immediate action.

Exactly a year ago, hackers leveraged publicly available exploits to attack vulnerable Struts servers and achieve remote code execution.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
9:58 am, Jan 16, 2025
weather icon 7°C
L: 6° | H: 8°
overcast clouds
Humidity: 92 %
Pressure: 1034 mb
Wind: 5 mph WSW
Wind Gust: 8 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:58 am
Sunset: 4:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
6° | 8°°C 0 mm 0% 4 mph 94 % 1035 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
3° | 7°°C 0 mm 0% 4 mph 96 % 1035 mb 0 mm/h
Sat Jan 18 9:00 pm
weather icon
2° | 7°°C 0 mm 0% 3 mph 87 % 1033 mb 0 mm/h
Sun Jan 19 9:00 pm
weather icon
1° | 6°°C 0 mm 0% 6 mph 90 % 1023 mb 0 mm/h
Mon Jan 20 9:00 pm
weather icon
5° | 9°°C 0 mm 0% 7 mph 96 % 1022 mb 0 mm/h
Today 12:00 pm
weather icon
8° | 8°°C 0 mm 0% 4 mph 88 % 1034 mb 0 mm/h
Today 3:00 pm
weather icon
8° | 9°°C 0 mm 0% 3 mph 84 % 1033 mb 0 mm/h
Today 6:00 pm
weather icon
6° | 6°°C 0 mm 0% 4 mph 93 % 1034 mb 0 mm/h
Today 9:00 pm
weather icon
5° | 5°°C 0 mm 0% 4 mph 94 % 1035 mb 0 mm/h
Tomorrow 12:00 am
weather icon
4° | 4°°C 0 mm 0% 3 mph 96 % 1034 mb 0 mm/h
Tomorrow 3:00 am
weather icon
4° | 4°°C 0 mm 0% 4 mph 96 % 1034 mb 0 mm/h
Tomorrow 6:00 am
weather icon
3° | 3°°C 0 mm 0% 3 mph 95 % 1035 mb 0 mm/h
Tomorrow 9:00 am
weather icon
3° | 3°°C 0 mm 0% 3 mph 95 % 1035 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€96,378.36
2.48%
Ethereum(ETH)
€3,236.95
4.17%
XRP(XRP)
€2.98
9.39%
Tether(USDT)
€0.97
0.01%
Solana(SOL)
€195.42
7.70%
Dogecoin(DOGE)
€0.363043
5.63%
USDC(USDC)
€0.97
-0.01%
Shiba Inu(SHIB)
€0.000021
3.88%
Pepe(PEPE)
€0.000017
7.24%
Peanut the Squirrel(PNUT)
€0.60
12.00%
Scroll to Top