Critical error on Apache Struts2 allows hackers to take over the web server
New researchers have discovered a remote code execution flaw in the Apache Struts open source web application framework, allowing an attacker to run malicious code on the server.
Apache Struts is a free open source Model-View-Control framework (MVC) for web application development written in Java, supporting both REST, AJAX and JSON.
This vulnerability (CVE-2017-9805) is a programming error in the way Struts handles data from unreliable sources. Specifically, Struts' REST plugin cannot handle XML payloads while converting data structures (deserialization) properly.
All versions of Apache Struts from 2008 (from Struts 2.5 to Struts 2.5.23) are affected, causing the framework's web applications to use REST plugins to be vulnerable to remote attacks.
The vulnerability on Apache Struts2 allows hackers to execute malicious code remotely
According to researchers at LGTM, the Struts framework is used by many organizations, including Lockheed Martin, Vodafone, Virgin Atlantic and IRS. 'Not to mention, the vulnerability is also very easy to use, all you need is a web browser,' said Man Yue Mo, researcher at LGTM. The attacker only needs to include the malicious XML code in a separate format to exploit this vulnerability on the server.
Successful exploits will allow hackers to take control of the entire infected server, thereby entering other systems on the same network.
Mo said that this error is due to the conversion of insecure data structures, similar vulnerabilities on Apache Commons Collections were discovered by Chris Frohoff and Gabriel Lawrence in 2015, also allowing the execution of random code.
Many Java applications have been affected by similar vulnerabilities in recent years. This vulnerability has been fixed from Struts 2.5.13 so administrators should update the Apache Struts they are using.
You should read it
- Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the server
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- Release software to check DNS server vulnerabilities
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- The malicious video file causes users to lose control of the device 'storming' in the Android world
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- Warning about serious vulnerabilities in SQL Server
- Detecting high-risk vulnerabilities potentially affecting 1 million servers worldwide
May be interested
- The same Skype ID malware author used to run IoT Botnet and apply for jobstrue to the biggest failure of all time, a malware developer uses the same skype address to advertise his iot botnet and also the skype id itself to apply for freelance jobs.
- The Linux subsystem on Windows 10 allows malware to hide without being detectedmicrosoft has shown how favorably linux has been for nearly three years and this love ultimately cost them.
- Billions of devices are affected by the new Bluetooth attackon tuesday, researchers at armis labs published details of a new attack that they thought could potentially affect all devices that could use bluetooth.
- The attacker can pass SKEL Protection on the macOS High Sierrathe new security feature on macos high siera (10.13), named secure kernel extension loading, can be bypassed, allowing downloading of kernel kernel extensions.
- Malicious ads dig virtual money right on the browserthe author of the malicious code uses javascript code transmitted via malvertising and digs a lot of digital currency on the user's browser without them knowing.
- Ransomware 'Your Windows has been banned' extorting users with a face value of 50 USD Bitcoinrecently, the new version of ransomware 'your windows has been banned' has been reported by many websites and warned that all computers and infected users should remember that this is a scam.