Vulnerability Details : CVE-2017-5638

The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Vulnerability category: Input validation
Published 2017-03-11 02:59:00
Updated 2021-02-24 12:15:16
View at NVD,
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2017-5638 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Apache Struts Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Apache Struts Jakarta Multipart parser allows for malicious file upload using the Content-Type value, leading to remote code execution.
Added on 2021-11-03 Action due date 2022-05-03

Exploit prediction scoring system (EPSS) score for CVE-2017-5638

Probability of exploitation activity in the next 30 days: 97.54%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2017-5638

  • Apache Struts Jakarta Multipart Parser OGNL Injection
    Disclosure Date: 2017-03-07
    First seen: 2020-04-26
    This module exploits a remote code execution vulnerability in Apache Struts version 2.3.5 - 2.3.31, and 2.5 - 2.5.10. Remote Code Execution can be performed via http Content-Type header. Native payloads will be converted to executables and dropped in the ser

CVSS scores for CVE-2017-5638

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source

CWE ids for CVE-2017-5638

  • The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
    Assigned by: (Primary)

References for CVE-2017-5638

Products affected by CVE-2017-5638

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to terms of use!