mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
2.0 KiB
2.0 KiB
CVE-2023-50164
Description
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
POC
Reference
Github
- https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis-
- https://github.com/Marco-zcl/POC
- https://github.com/Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE
- https://github.com/Threekiii/CVE
- https://github.com/Trackflaw/CVE-2023-50164-ApacheStruts2-Docker
- https://github.com/aaronm-sysdig/cve-2023-50164
- https://github.com/bcdannyboy/CVE-2023-50164
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dwisiswant0/cve-2023-50164-poc
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/helsecert/cve-2023-50164
- https://github.com/henrikplate/struts-demo
- https://github.com/hetianlab/S2-066
- https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE
- https://github.com/mdisec/mdisec-twitch-yayinlari
- https://github.com/minhbao15677/CVE-2023-50164
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/snyk-labs/CVE-2023-50164-POC
- https://github.com/sunnyvale-it/CVE-2023-50164-PoC
- https://github.com/tanjiti/sec_profile
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/xingchennb/POC-
- https://github.com/yijinglab/S2-066