Vulnerability Details : CVE-2023-50164
Potential exploit
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
Vulnerability category: Execute code
Products affected by CVE-2023-50164
- cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-50164
53.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-50164
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-50164
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: security@apache.org (Secondary)
References for CVE-2023-50164
-
https://www.openwall.com/lists/oss-security/2023/12/07/1
oss-security - CVE-2023-50164: Apache Struts: File upload component had a directory traversal vulnerabilityMailing List
-
http://www.openwall.com/lists/oss-security/2023/12/07/1
oss-security - CVE-2023-50164: Apache Struts: File upload component had a directory traversal vulnerability
-
https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj
[ANN] Apache Struts 6.3.0.2 & 2.5.33-Apache Mail ArchivesMailing List;Patch
-
https://security.netapp.com/advisory/ntap-20231214-0010/
CVE-2023-50164 Apache Struts Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html
Struts S2-066 File Upload Remote Code Execution ≈ Packet StormThird Party Advisory;VDB Entry
Jump to