CVE-2024-53677 is a critical (9.5) remote code execution (RCE) vulnerability affecting Apache Struts, an open-source framework for building Java-based web apps. This vulnerability affects the framework’s file upload logic, allowing attackers to enable paths traversal and perform remote code execution using malicious files.
The following assets are affected by CVE-2024-53677:
Apache noted that applications not using FileUploadInterceptor are not affected by this vulnerability.
Upgrade: Customers are advised to upgrade to Struts 6.4.0 or greater. There is no fix available for Struts 2.0.0 through Struts 2.3.37 or Struts 2.5.0 through Struts 2.5.33, as they are no longer supported by Apache.
If it isn’t feasible to patch affected devices, organizations can migrate to the new file upload mechanism.
However, this change is not backwards compatible. To prevent this vulnerability from being exploited, all existing actions using the old file upload mechanism must be rewritten to work with the new Action File Upload mechanism and its related interceptor. Continuing to use the old file upload mechanism, even after upgrading, will leave your application vulnerable to this attack.
A researcher from ISC SANS, Johannes Ulrich, reported that there have been active attempts to exploit this vulnerability linked to a single IP address. “We are seeing active exploit attempts for this vulnerability that match the PoC exploit code.
So far, attacks have been limited to attempts to enumerate vulnerable devices, using the exploit to upload a single line of code in a file named “exploit.jsp”. Upon successful exploitation, the file prints the “Apache Struts” spring, alerting attackers that the vulnerability is exploitable.
Widespread exploitation of this vulnerability is a serious threat because Apache Struts is used by enterprise organizations across the world due to its many integrations, data validation capabilities, and scalable architecture. Potentially impacted industries include financial institutions, government agencies, and airlines.
CyCognito is actively researching less intrusive detection methods to identify CVE-2024-53677 without taking actions that could alter or disrupt customer environments. For now, CyCognito is flagging assets that are potentially vulnerable alongside remediation instructions.
Figure 1: The alert sent by CyCognito for CVE-2024-53677
CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.
Emma Zaballos is an avid threat researcher who is passionate about understanding and combatting cybercrime threats. Emma enjoys monitoring dark web marketplaces, profiling ransomware gangs, and using intelligence for understanding cybercrime.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.