SummaryPossible Remote Code Execution when performing file upload based on Jakarta plugin
Who should read this
All Struts 2 developers and users
Impact of vulnerability
Possible RCE when performing file upload based on Jakarta plugin
Maximum security rating
Upgrade to Struts 2.3.32 or Struts 126.96.36.199
Struts 2.3.5 - Struts 2.3.31, Struts 2.5 - Struts 2.5.10
Nike Zheng <nike dot zheng at dbappsecurity dot com dot cn>
It is possible to perform a RCE attack with malicious a
Content-Type value. If the
Content-Type value isn't valid an exception is thrown which is then used to display an error message to a user.
If you are using Jakarta based file upload plugin, upgrade to Apache Struts version 2.3.32 or 188.8.131.52
No backward incompatibility issues are expected.
Implement a Servlet filter which will validate
Content-Type and throw away request with suspicious values not matching