1,718,000+ Apache Struts 2 Installation Open to RCE Attacks
Threat actors target Apache Struts 2 attributable to vulnerabilities in its code that can even be exploited for unauthorized gain entry to to web applications.
Exploiting these vulnerabilities enables attackers to originate arbitrary code that would possibly perhaps well perhaps also lead to pudgy arrangement compromise.
As Apache Struts 2 is extensively frail in web building, a success assaults can influence many applications, making it a resplendent target for those searching out for normal exploits and data breaches.
Cybersecurity researchers at CYFIRMA Research honest now now not too prolonged ago came across greater than 1,718,898 Apache Struts 2 installations are originate to RCE (A long way off code execution) assaults.
The RCE flaw became tracked as “CVE-2023-50164” by security analysts, and this flaw enables probability actors to construct faraway code execution and file upload assaults.
Fastrack Compliance: The Course to ZERO-Vulnerability
Compounding the hiss are zero-day vulnerabilities adore the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that gain came across every month. Delays in fixing these vulnerabilities lead to compliance factors, these prolong can even be minimized with a uncommon function on AppTrana that helps you to gain “Zero vulnerability file” within 72 hours.
Flaw profile
- Vulnerability Form: Unauthenticated A long way off Code Execution (RCE) by technique of Apache Struts File Upload
- CVE ID: CVE-2023-50164
- CVSS Severity Gather: 9.8 (Serious)
- Application: Apache Struts 2
- Affect: Permits unauthenticated attackers to originate arbitrary code by exploiting a file upload vulnerability
- Severity: Serious
- Affected Versions: A pair of variations of Apache Struts 2 are impacted; talk about with the hyperlink
- Patch Readily accessible: Optimistic
Technical diagnosis
Apache Struts 2 faces a considerable probability with CVE-2023-50164, which lets attackers originate code and upload malicious recordsdata.
CYFIRMA researchers uncovered the flaw’s severity and tied it to a file upload weak point within the framework, posing severe security dangers.
Exploiting this severe RCE vulnerability endangers arrangement integrity and confidentiality and opens doorways to data breaches.
Safety specialists highlight the exploit’s reliance on HTTP parameter case sensitivity that enables the probability actors to govern the variables which are severe in nature.
Alternatively, the Apache team responds strategically to a vulnerability by introducing equalsIgnoreCase() methodology, countering case sensitivity manipulation in most modern commits.
The enhancement targets to toughen the Apache Struts in opposition to parameter air pollution leading to course traversal exploits. The vulnerability in AbstractMultiPartRequest.java enables the persistence of course traversal payloads.
The concerns additionally involve going thru of the oversized temporary recordsdata for the length of uploads which would possibly perhaps also pose a severe persistence probability.
Apache launched a if reality be told crucial commitment to counter the dangers, ‘Continuously delete uploaded file,’ this ensures consistent elimination of temporary recordsdata and additionally blocks the avenues for continual assaults.
The commitment displays proactive measures to address security concerns. Along with this, the most modern code changes additionally divulge Apache’s commitment to making improvements to framework security.
Apply Apache Struts 2 updates as rapidly as doubtless to mitigate the “CVE-2023-50164” flaw. Boost defense with custom guidelines, file upload monitoring, and improved firewall settings. Be definite to behave promptly to end any unauthorized gain entry to and code execution.
Source credit : cybersecuritynews.com