CVE-2023-50164: Files or Directories Accessible to External Parties
(updated )
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
References
- www.openwall.com/lists/oss-security/2023/12/07/1
- github.com/advisories/GHSA-2j39-qcjm-428w
- github.com/apache/struts/commit/162e29fee9136f4bfd9b2376da2cbf590f9ea163
- github.com/apache/struts/commit/d8c69691ef1d15e76a5f4fcf33039316da2340b6
- lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj
- nvd.nist.gov/vuln/detail/CVE-2023-50164
- www.openwall.com/lists/oss-security/2023/12/07/1
Detect and mitigate CVE-2023-50164 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →