TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Apache Struts2 CVE-2023-50164, File Upload Vulnerability Analysis

2 pointsby SamHoustonCMover 1 year ago

2 comments

SamHoustonCMover 1 year ago
Matthew Remacle (Remy) digs into the newly disclosed Apache Struts2 CVE-2023-50164 file upload vulnerability. This weakness allows an attacker to drop a web shell that can be called remotely through a public interface over defined routes.<p>Apache Struts2 is an open-source Java web application development framework used in various enterprise-grade applications and business use cases.<p>The vulnerability occurs when a multipart form request is used, and the constraints for path normalization are bypassed.<p>The attacker can inject a web shell (e.g., shell.jsp) into the file system, which can then be remotely called.<p>The exploitation of this vulnerability depends on the specific implementation of Apache Struts2 in a vendor&#x27;s product and the defined actions&#x27; path.
latchkeyover 1 year ago
Previously:<p><a href="https:&#x2F;&#x2F;www.synopsys.com&#x2F;blogs&#x2F;software-security&#x2F;equifax-apache-struts-vulnerability-cve-2017-5638.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.synopsys.com&#x2F;blogs&#x2F;software-security&#x2F;equifax-apa...</a><p>I wonder how long before I get more notices from Equifax.