Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

 
Research

Emerging Threat: Apache Struts CVE-2024-53677

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
December 19, 2024

What is CVE-2024-53677? 

CVE-2024-53677 is a critical (9.5) remote code execution (RCE) vulnerability affecting Apache Struts, an open-source framework for building Java-based web apps. This vulnerability affects the framework’s file upload logic, allowing attackers to enable paths traversal and perform remote code execution using malicious files. 

What assets are affected by CVE-2024-53677? 

The following assets are affected by CVE-2024-53677: 

  • Struts 2.0.0 through Struts 2.3.37 (EOL)
  • Struts 2.5.0 through Struts 2.5.33 (EOL)
  • Struts 6.0.0 through Struts 6.3.0.2 

Apache noted that applications not using FileUploadInterceptor are not affected by this vulnerability.

Are fixes available? 

Upgrade: Customers are advised to upgrade to Struts 6.4.0 or greater. There is no fix available for Struts 2.0.0 through Struts 2.3.37 or Struts 2.5.0 through Struts 2.5.33, as they are no longer supported by Apache. 

Are there any other recommended actions to take? 

If it isn’t feasible to patch affected devices, organizations can migrate to the new file upload mechanism

However, this change is not backwards compatible. To prevent this vulnerability from being exploited, all existing actions using the old file upload mechanism must be rewritten to work with the new Action File Upload mechanism and its related interceptor. Continuing to use the old file upload mechanism, even after upgrading, will leave your application vulnerable to this attack. 

Is CVE-2024-53677 being actively exploited? 

A researcher from ISC SANS, Johannes Ulrich, reported that there have been active attempts to exploit this vulnerability linked to a single IP address. “We are seeing active exploit attempts for this vulnerability that match the PoC exploit code.

So far, attacks have been limited to attempts to enumerate vulnerable devices, using the exploit to upload a single line of code in a file named “exploit.jsp”. Upon successful exploitation, the file prints the “Apache Struts” spring, alerting attackers that the vulnerability is exploitable. 

What types of organizations are at risk from CVE-2024-53677? 

Widespread exploitation of this vulnerability is a serious threat because Apache Struts is used by enterprise organizations across the world due to its many integrations, data validation capabilities, and scalable architecture. Potentially impacted industries include financial institutions, government agencies, and airlines.   

How is CyCognito helping customers identify assets vulnerable to CVE-2024-53677? 

CyCognito is actively researching less intrusive detection methods to identify CVE-2024-53677 without taking actions that could alter or disrupt customer environments. For now, CyCognito is flagging assets that are potentially vulnerable alongside remediation instructions. 

Figure 1: The alert sent by CyCognito for CVE-2024-53677

How can CyCognito help your organization? 

CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.


Topics



Search the Blog



Recent Posts






Tim Matthews
How to Budget for EASM
By Tim Matthews
November 18, 2024


Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.