mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
54 lines
2.9 KiB
Markdown
54 lines
2.9 KiB
Markdown
### [CVE-2024-53677](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53677)
|
||

|
||

|
||

|
||
|
||
### Description
|
||
|
||
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.This issue affects Apache Struts: from 2.0.0 before 6.4.0.Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067
|
||
|
||
### POC
|
||
|
||
#### Reference
|
||
No PoCs from references.
|
||
|
||
#### Github
|
||
- https://github.com/0xPThree/struts_cve-2024-53677
|
||
- https://github.com/0xdeviner/CVE-2024-53677
|
||
- https://github.com/20142995/nuclei-templates
|
||
- https://github.com/BuludX/CVE-2024-53677
|
||
- https://github.com/Cythonic1/CVE-2024-53677-POC
|
||
- https://github.com/EQSTLab/CVE-2024-53677
|
||
- https://github.com/J1ezds/Vulnerability-Wiki-page
|
||
- https://github.com/NonitBajaj/Burp_Suite
|
||
- https://github.com/PuddinCat/GithubRepoSpider
|
||
- https://github.com/Q0LT/VM-CVE-2024-53677
|
||
- https://github.com/SeanRickerd/CVE-2024-53677
|
||
- https://github.com/TAM-K592/CVE-2024-53677-S2-067
|
||
- https://github.com/Threekiii/Awesome-POC
|
||
- https://github.com/Threekiii/CVE
|
||
- https://github.com/XiaomingX/CVE-2024-53677-S2-067
|
||
- https://github.com/Y4tacker/JavaSec
|
||
- https://github.com/a1batr0ssG/VulhubExpand
|
||
- https://github.com/botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study
|
||
- https://github.com/c4oocO/CVE-2024-53677-Docker
|
||
- https://github.com/cloudwafs/s2-067-CVE-2024-53677
|
||
- https://github.com/cyb3r-w0lf/nuclei-template-collection
|
||
- https://github.com/dustblessnotdust/CVE-2024-53677-S2-067-thread
|
||
- https://github.com/endorlabs/struts-workshop
|
||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||
- https://github.com/hopsypopsy8/CVE-2024-53677-Exploitation
|
||
- https://github.com/hopsypopsy8/hopsypopsy8
|
||
- https://github.com/ileisd/CiberSeg-Estudi
|
||
- https://github.com/jjyj2302/Struts2-CVE
|
||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
- https://github.com/plzheheplztrying/cve_monitor
|
||
- https://github.com/punitdarji/Apache-struts-cve-2024-53677
|
||
- https://github.com/r007sec/CVE-2024-53677
|
||
- https://github.com/saad0x1/Exploits
|
||
- https://github.com/shishirghimir/CVE-2024-53677-Exploit
|
||
- https://github.com/yangyanglo/CVE-2024-53677
|
||
- https://github.com/zhanpengliu-tencent/medium-cve
|
||
- https://github.com/zulloper/cve-poc
|
||
|