漏洞描述 Apache Struts2是一个基于Java的开源Web应用框架。该漏洞源于在处理转换错误时评估字符串为OGNL表达式,导致远程攻击者可利用此漏洞借助无效的输入,修改run-time数据值,进而执行任意代码。此漏洞利用难度低且危害严重,可导致服务器完全失陷,建议企业立即升级至安全版本。
相关漏洞推荐 POCCVE-2007-4556: OpenSymphony XWork/Apache Struts2 - Remote Code Execution S2-001 POCCVE-2012-0392: Apache Struts2 S2-008 RCE POCCVE-2013-1965: Apache Struts2 S2-012 RCE POCCVE-2017-12611: Apache Struts2 S2-053 - Remote Code Execution POCCVE-2017-9791: Apache Struts2 S2-053 RCE POCCVE-2018-11776: Apache Struts2 S2-057 - Remote Code Execution POCCVE-2021-31805: Apache Struts2 S2-062 RCE 无POCApache Struts2 S2-067 /index.action 文件上传漏洞(CVE-2024-53677) POCCVE-2007-4556: OpenSymphony XWork/Apache Struts2 - Remote Code Execution POCCVE-2012-0392: Apache Struts2 S2-008 RCE POCCVE-2013-1965: Apache Struts2 S2-012 RCE POCCVE-2017-12611: Apache Struts2 S2-053 - Remote Code Execution POCCVE-2017-9791: Apache Struts2 S2-053 - Remote Code Execution