cve/2024/CVE-2024-53677.md

54 lines
2.9 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-53677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53677)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Struts&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=2.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=File%20upload%20logic%20is%20flawed&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.This issue affects Apache Struts: from 2.0.0 before 6.4.0.Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xPThree/struts_cve-2024-53677
- https://github.com/0xdeviner/CVE-2024-53677
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2025-09-29 16:08:36 +00:00
- https://github.com/BuludX/CVE-2024-53677
- https://github.com/Cythonic1/CVE-2024-53677-POC
- https://github.com/EQSTLab/CVE-2024-53677
- https://github.com/J1ezds/Vulnerability-Wiki-page
2025-09-29 21:09:30 +02:00
- https://github.com/NonitBajaj/Burp_Suite
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/Q0LT/VM-CVE-2024-53677
2025-09-29 16:08:36 +00:00
- https://github.com/SeanRickerd/CVE-2024-53677
- https://github.com/TAM-K592/CVE-2024-53677-S2-067
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/CVE
- https://github.com/XiaomingX/CVE-2024-53677-S2-067
- https://github.com/Y4tacker/JavaSec
- https://github.com/a1batr0ssG/VulhubExpand
- https://github.com/botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study
- https://github.com/c4oocO/CVE-2024-53677-Docker
- https://github.com/cloudwafs/s2-067-CVE-2024-53677
2025-09-29 21:09:30 +02:00
- https://github.com/cyb3r-w0lf/nuclei-template-collection
2025-09-29 16:08:36 +00:00
- https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread
- https://github.com/endorlabs/struts-workshop
2025-09-29 21:09:30 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00
- https://github.com/hopsypopsy8/CVE-2024-53677-Exploitation
- https://github.com/hopsypopsy8/hopsypopsy8
2025-09-29 21:09:30 +02:00
- https://github.com/ileisd/CiberSeg-Estudi
2025-09-29 16:08:36 +00:00
- https://github.com/jjyj2302/Struts2-CVE
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/punitdarji/Apache-struts-cve-2024-53677
- https://github.com/r007sec/CVE-2024-53677
- https://github.com/saad0x1/Exploits
- https://github.com/shishirghimir/CVE-2024-53677-Exploit
- https://github.com/yangyanglo/CVE-2024-53677
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/zulloper/cve-poc