The Apache Software Foundation fixed a critical file upload vulnerability in the Struts 2 open-source framework. This flaw, tracked as CVE-2023-50164, could allow remote code execution.
An attacker can manipulate file upload parameters to upload a malicious file and execute code on the server.
“An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.” reads the advisory published by Apache Software Foundation. Upgrade to Struts 2.5.33 or higher, as advised by the foundation.
Steven Seeley from Source Incite reported the vulnerability. Apache has not confirmed any active exploitation in attacks.
ALSO READ:
Mid-sized Canadian firms pay an average $1.13 million to ransomware gangs