Threat Level: green Handler on Duty: Tom Webb

SANS ISC: Critical RCE on Apache Struts2 is being actively exploited [CVE-2017-5638] - SANS Internet Storm Center SANS ISC InfoSec Forums


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Critical RCE on Apache Struts2 is being actively exploited [CVE-2017-5638]
Please have a look at this recently announced Remote Code Execution vulnerability affecting Apache Struts2 (Jakarta Multipart parser).
Malicious "Content-Type" Header values are being used to throw an exception and execute code.
It is being actively exploited the last few days.

References:
https://cwiki.apache.org/confluence/display/WW/S2-045
https://github.com/rapid7/metasploit-framework/issues/8064
http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html?m=1
Anonymous

Sign Up for Free or Log In to start participating in the conversation!