Search for packages
| purl | pkg:maven/org.apache.struts/struts2-core@6.3.0.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-87fh-rvvb-6ubq
Aliases: CVE-2024-53677 GHSA-43mq-6xmg-29vm |
Apache Struts file upload logic is flawed File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 . |
Affected by 1 other vulnerability. |
|
VCID-95ts-vpk6-uubg
Aliases: CVE-2025-66675 GHSA-rg58-xhh7-mqjw |
Apache Struts has a Denial of Service vulnerability Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-gfxq-vtry-bqgg | Files or Directories Accessible to External Parties An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. |
CVE-2023-50164
GHSA-2j39-qcjm-428w |