Description

Developers using the Apache Struts framework must urgently update their systems to address a critical security flaw (CVE-2024-53677, CVSS 9.5) that enables remote code execution (RCE). This vulnerability, reminiscent of the notorious S2-066 exploit, affects Apache Struts versions 2.0.0 to 2.5.33 and 6.0.0 to 6.3.0.2. It stems from a path traversal issue in the file upload mechanism, allowing attackers to manipulate file upload parameters to upload and execute malicious files. The severity of this flaw cannot be overstated, as successful exploitation could result in data breaches, system compromises, or even full server control. Organizations leveraging Apache Struts for web applications are strongly advised to act immediately to mitigate this threat. The Apache Struts team has released a fix in version 6.4.0 and beyond. However, upgrading to this version requires adopting a new Action File Upload mechanism, which involves rewriting file upload logic. This change is not backward-compatible, and continuing to use the old mechanism will leave systems vulnerable. This mandatory code adjustment could delay patching efforts, potentially leaving systems exposed. Organizations must allocate the necessary resources to ensure a timely and comprehensive migration to the updated version. By addressing CVE-2024-53677 promptly, organizations can safeguard their systems from potential attacks, reducing the risk of severe consequences. Swift action is essential to prevent exploitation and maintain security.