# Apache Struts: 混合设置上传的文件和普通字段可以绕过文件上传检查
## 漏洞概述
Apache Struts中的文件上传逻辑存在缺陷。攻击者可以通过操纵文件上传参数实现路径遍历,并在某些情况下上传恶意文件,从而执行远程代码。
## 影响版本
- Apache Struts 2.0.0 至 6.4.0 之前的版本
## 细节
- 攻击者可以利用路径遍历漏洞上传恶意文件,进而执行远程代码。
- 此漏洞存在于旧版本的文件上传逻辑中,特别是在使用 `FileuploadInterceptor` 的情况下。
## 影响
- 建议用户至少升级到 6.4.0 版本,并迁移到新的文件上传机制:https://struts.apache.org/core-developers/file-upload。
- 如果没有使用基于 `FileuploadInterceptor` 的旧文件上传逻辑,应用是安全的。
更多细节参考:https://cwiki.apache.org/confluence/display/WW/S2-067
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | s2-067(CVE-2024-53677) | https://github.com/cloudwafs/s2-067-CVE-2024-53677 | POC详情 |
2 | A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads. | https://github.com/TAM-K592/CVE-2024-53677-S2-067 | POC详情 |
3 | None | https://github.com/yangyanglo/CVE-2024-53677 | POC详情 |
4 | A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. | https://github.com/c4oocO/CVE-2024-53677-Docker | POC详情 |
5 | A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads. | https://github.com/XiaomingX/CVE-2024-53677-S2-067 | POC详情 |
6 | None | https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread | POC详情 |
7 | None | https://github.com/0xdeviner/CVE-2024-53677 | POC详情 |
8 | Struts Vulnerability - CVE-2024-53677 | https://github.com/Q0LT/VM-CVE-2024-53677 | POC详情 |
9 | Proof-of-Concept for CVE-2024-46538 | https://github.com/EQSTLab/CVE-2024-53677 | POC详情 |
10 | None | https://github.com/0xPThree/struts_cve-2024-53677 | POC详情 |
11 | None | https://github.com/punitdarji/Apache-struts-cve-2024-53677 | POC详情 |
12 | Vulnerable Environment and Exploit for CVE-2024-53677 | https://github.com/SeanRickerd/CVE-2024-53677 | POC详情 |
13 | Apache Struts CVE-2024-53677 Exploitation | https://github.com/hopsypopsy8/CVE-2024-53677-Exploitation | POC详情 |
14 | None | https://github.com/shishirghimir/CVE-2024-53677-Exploit | POC详情 |
15 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts%20S2-067%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2024-53677.md | POC详情 |
16 | CVE-2024-53677 | https://github.com/BuludX/CVE-2024-53677 | POC详情 |
17 | None | https://github.com/r007sec/CVE-2024-53677 | POC详情 |
标题: S2-067 - Apache Struts 2 Wiki - Apache Software Foundation -- 🔗来源链接
标签: vendor-advisory
暂无评论