An unauthenticated remote code execution vulnerability in the Apache Struts 2 package has been publicly reported which allows a remote user to execute arbitrary commands on target systems.
The vulnerability allows an unauthenticated attacker to execute code remotely on a vulnerable system through the use of a specially crafted Content-Type header. The attack code will be executed with the permission of the web server user. Attack tools exist publicly and this vulnerability is being actively exploited.
CVE Reference: CVE-2017-5638
Date: March 9th, 2017
Reissue Date: September 18th, 2017
Fix Available: Yes
Impact: Possible Remote Code Execution when performing file uploads based on Apache Struts Jakarta Multipart parser.
Security Rating: CRITICAL
Struts 2.3.5 – Struts 2.3.31, Struts 2.5 – Struts 2.5.10
Upgrade to Struts 2.3.32 or Struts 126.96.36.199. Visit the vendor’s website struts.apache.org/docs/s2-045.html for more information regarding this vulnerability.
Underlying Affected Products
Underlying products or system components from other vendors can potentially be affected by this vulnerability. Table 1 below provides a listing of those vendors who have issued fixes for affected products potentially vulnerable to exploits described in this advisory.
We highly recommend you visit the vendor’s website for those products and or system components that are applicable to your environment and infrastructure for more specific information on how best to fix the vulnerability.
|HPE||Universal Configuration |
|HPe Server Automation||http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03749en_us|