📢⚠️ Years-old vulnerable Apache Struts 2 versions were downloaded 387K+ times in one week, despite a high-severity CVE-2025-68493 flaw - Patch to 6.1.1 now!

Read: https://hackread.com/years-old-vulnerable-apache-struts-2-downloads/

#Cybersecurity #ApacheStruts #Vulnerability #InfoSec #DevSecOps

Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Security researchers reveal #activeexploitation against a critical #ApacheStruts 2 vulnerability

The vulnerability is tracked as CVE-2024-53677, and when exploited, can allow an attacker to remotely execute code

Administrators are advised to patch ASAP

#cybersecurity

https://www.bleepingcomputer.com/news/security/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers/

New critical Apache Struts flaw exploited to find vulnerable servers

A recently patched critical Apache Struts 2 vulnerability tracked as CVE-2024-53677 is actively exploited using public proof-of-concept exploits to find vulnerable devices.

BleepingComputer
Jetzt patchen! Angreifer nutzen kritische Sicherheitslücke in Apache Struts aus | heise online
https://heise.de/-10212840 #ApacheStruts #Sicherheitslücke #Uploadfunktion #Sicherheitsupdate
Jetzt patchen! Angreifer nutzen kritische Sicherheitslücke in Apache Struts aus

Die Uploadfunktion von Apache Struts ist fehlerhaft und Angreifer können Schadcode hochladen. Sicherheitsforscher warnen vor Attacken.

heise online
What’s New in Apache Struts 7 | SoftwareMill

With the release of Apache Struts 7.0.0, the framework takes a significant leap forward, introducing a host of new features and improvements.

SoftwareMill
Apache Struts Arbitrary File Upload Vulnerability S2-067 (CVE-2024-53677) - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.

Overview Recently, NSFOCUS CERT monitored that Apache released a security bulletin, fixing the Apache Struts arbitrary file upload vulnerability S2-067 (CVE-2024-53677). Due to a logical defect in the file upload function, an unauthenticated attacker can perform path traversal by controlling the file upload parameters, thereby uploading malicious files to achieve remote code execution. The CVSS […]

NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.

👉 Discover the latest on Apache Struts, facing a critical vulnerability with the potential for remote code execution.

Dive into our coverage for detailed insights on this security concern: https://bit.ly/3NEOuJ7

#apachestruts #apache #zeroday #vulnerability #webapplications #https #vulnerabilityscanning #waap #DAST #virtualpatching #appsec #apptrana #indusface

Apache Struts 2 Vulnerability CVE-2023-50164 |Indusface Blog

The latest vulnerability CVE-2023-50164 disclosed on Apache Struts affects the Struts 2 framework's file upload logic, allowing unauthorized path traversal.

Indusface

Hackers are exploiting a recently patched vulnerability in Apache Struts. The vulnerability is tracked as CVE-2023-50164, and when exploited, can lead to remote code execution. The vulnerability affects Struts versions 2.0.0 to 2.3.37, 2.5.0 to 2.5.32, and 6.0.0 to 6.3.0. Administrators are advised to patch ASAP, and look for signs of breach on unpatched installations.

#cybersecurity #activeexploitation #apache #apachestruts

https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-apache-struts-flaw-using-public-poc/

Hackers are exploiting critical Apache Struts flaw using public PoC

Hackers are attempting to leverage a recently fixed critical vulnerability (CVE-2023-50164) in Apache Struts that leads to remote code execution, in attacks that rely on publicly available proof-of-concept exploit code.

BleepingComputer

"⚠️ Critical Apache Struts Vulnerability Alert! CVE-2023-50164 🚨"

Hackers are exploiting a critical vulnerability in Apache Struts (CVE-2023-50164), a popular Java EE web app framework used widely in various industries. This flaw allows unauthorized remote code execution, posing a severe threat to organizations using Struts versions 2.0.0 through 2.5.32 and 6.0.0 through 6.3.0.1. Attackers can manipulate file upload parameters for path traversal, leading to malicious file uploads and potentially gaining control over the server. An immediate upgrade to Struts 2.5.33 or 6.3.0.2 is vital to mitigate this risk.

Source: BleepingComputer, [trganda.github.io](https://trganda.github.io/notes/security/vulnerabilities/apache-struts/Apache-Struts-Remote-Code-Execution-Vulnerability-(-S2-066-CVE-2023-50164), Qualys ThreatPROTECT

Author Credits: Bill Toulas (BleepingComputer), Diksha Ojha (Qualys ThreatPROTECT)

Tags: #CyberSecurity #ApacheStruts #Vulnerability #CVE2023-50164 #RemoteCodeExecution #InfoSec

Hackers are exploiting critical Apache Struts flaw using public PoC

Hackers are attempting to leverage a recently fixed critical vulnerability (CVE-2023-50164) in Apache Struts that leads to remote code execution, in attacks that rely on publicly available proof-of-concept exploit code.

BleepingComputer

Apache Tiles greatly simplifies web component reuse in your application, especially when paired with Struts support, boosting your confidence in future Struts and Tiles integration...

#apachestruts #apachetiles #java

https://softwaremill.com/how-apache-struts-supports-apache-tiles/

How Apache Struts supports Apache Tiles | SoftwareMill

Apache Tiles greatly simplifies web component reuse in your application, especially when paired with Struts support, boosting your confidence in future Struts and Tiles integration

SoftwareMill
Aufgrund der Gefahr von möglichen Schadcode-Attacken sollten Admins ihre Apache-Struts-Systeme auf den aktuellen Stand bringen.
Sicherheitspatch für Apache Struts unvollständig – neues Updates soll es richten
Sicherheitspatch für Apache Struts unvollständig – neues Updates soll es richten

Aufgrund der Gefahr von möglichen Schadcode-Attacken sollten Admins ihre Apache-Struts-Systeme auf den aktuellen Stand bringen.

heise online