2023-12-07 11:01:06 +00:00
{
"id" : "CVE-2023-50164" ,
"sourceIdentifier" : "security@apache.org" ,
"published" : "2023-12-07T09:15:07.060" ,
2023-12-14 11:00:21 +00:00
"lastModified" : "2023-12-14T10:15:08.530" ,
2023-12-13 19:01:06 +00:00
"vulnStatus" : "Modified" ,
2023-12-07 11:01:06 +00:00
"descriptions" : [
{
"lang" : "en" ,
2023-12-07 23:00:21 +00:00
"value" : "An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\nUsers are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to\u00a0fix this issue.\n"
2023-12-07 13:00:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "Un atacante puede manipular los par\u00e1metros de carga de archivos para permitir path traversal y, en algunas circunstancias, esto puede provocar la carga de un archivo malicioso que puede usarse para realizar la ejecuci\u00f3n remota de c\u00f3digo. Se recomienda a los usuarios actualizar a las versiones Struts 2.5.33 o Struts 6.3.0.1 o superior para solucionar este problema."
2023-12-07 11:01:06 +00:00
}
] ,
2023-12-12 19:00:24 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
2023-12-07 11:01:06 +00:00
"weaknesses" : [
{
"source" : "security@apache.org" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-552"
}
]
}
] ,
2023-12-12 19:00:24 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.0.0" ,
"versionEndExcluding" : "2.5.33" ,
"matchCriteriaId" : "BE174994-63BE-4A3F-A986-7903868FCE23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.0.0" ,
"versionEndExcluding" : "6.3.0.2" ,
"matchCriteriaId" : "DBE0443B-320B-4C29-83DC-624546AEE6D5"
}
]
}
]
}
] ,
2023-12-07 11:01:06 +00:00
"references" : [
2023-12-13 19:01:06 +00:00
{
"url" : "http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html" ,
"source" : "security@apache.org"
} ,
2023-12-07 17:00:28 +00:00
{
2023-12-07 23:00:21 +00:00
"url" : "https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj" ,
2023-12-12 19:00:24 +00:00
"source" : "security@apache.org" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2023-12-07 17:00:28 +00:00
} ,
2023-12-14 11:00:21 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20231214-0010/" ,
"source" : "security@apache.org"
} ,
2023-12-07 11:01:06 +00:00
{
2023-12-07 23:00:21 +00:00
"url" : "https://www.openwall.com/lists/oss-security/2023/12/07/1" ,
2023-12-12 19:00:24 +00:00
"source" : "security@apache.org" ,
"tags" : [
"Mailing List"
]
2023-12-07 11:01:06 +00:00
}
]
}