Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache struts |
|
CPEs | cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache struts |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 03 Jan 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 20 Dec 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 | File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 |
Wed, 18 Dec 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 | File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 |
Mon, 16 Dec 2024 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0, which fixes the issue. You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 | File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 |
Thu, 12 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-434 | |
Metrics |
ssvc
|
Thu, 12 Dec 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-552 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 11 Dec 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | File upload logic is flawed vulnerability in Apache Struts. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0, which fixes the issue. You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 | |
Title | Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: apache
Published: 2024-12-11T15:35:43.389Z
Updated: 2025-01-03T12:04:30.841Z
Reserved: 2024-11-21T17:02:02.847Z
Link: CVE-2024-53677

Updated: 2025-01-03T12:04:30.841Z

Status : Analyzed
Published: 2024-12-11T16:15:14.593
Modified: 2025-07-15T16:30:19.423
Link: CVE-2024-53677
