CVE-2024-53677

File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*

History

15 Jul 2025, 16:30

Type Values Removed Values Added
First Time Apache
Apache struts
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
References () https://cwiki.apache.org/confluence/display/WW/S2-067 - () https://cwiki.apache.org/confluence/display/WW/S2-067 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20250103-0005/ - () https://security.netapp.com/advisory/ntap-20250103-0005/ - Third Party Advisory

03 Jan 2025, 12:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250103-0005/ -

20 Dec 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-11 16:15

Updated : 2025-07-15 16:30


NVD link : CVE-2024-53677

Mitre link : CVE-2024-53677

CVE.ORG link : CVE-2024-53677


JSON object : View

Products Affected

apache

  • struts
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type