• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability
CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability
07 September 2017

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

Written by Pradeep Kulkarni
Pradeep Kulkarni
Security

A critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned to it. The attacker may use this vulnerability to target organizations across the globe. Web applications running on Apache Struts framework which uses REST (Representational State Transfer) plugin are affected by this vulnerability.

Vulnerable Versions

  • Struts 2.5 – Struts 2.5.12

Vulnerability

The root cause of this vulnerability lies in handling of deserializes input data by REST plugin of Apache Struts application. This vulnerability allows remote attackers to perform remote code execution by sending crafted POST request. Attackers can embed commands into vulnerable field of POST request body. The vulnerability is triggered while processing a crafted POST request having header ‘Content-Type’ set to ‘application/xml’.

We reproduced the vulnerability by using readily available Metasploit compatible POC.  Below is the traffic capture denoting crafted POST request which triggers the vulnerability.

fig_1_1

Fig 1. Vulnerability Trigger
Fig 1. Vulnerability Trigger

 

Fig 2. Payload drop at /tmp location on server
Fig 2. Payload drop at /tmp location on server

 

Quick Heal Detections

Quick Heal has released the following IPS detection for the vulnerability CVE-2017-9805.

  • VID-03103: Apache Struts Remote Command Execution

This critical vulnerability is patched by Apache Struts. We strongly recommend users to upgrade their Apache Struts installation to 2.3.34 and 2.5.13 as per the advisory and also apply the latest security updates by Seqrite.

References

https://lgtm.com/blog/apache_struts_CVE-2017-9805
https://struts.apache.org/docs/s2-052.html

 

Subject Matter Experts

  • Aniruddha Dolas, Pallavi Pangavhane | Quick Heal Security Labs

 Previous PostHealthcare: Cybersecurity risks with vendors
Next Post  Why Data Breaches should make you rethink your IT Strategy
Pradeep Kulkarni

About Pradeep Kulkarni

Pradeep Kulkarni is leading the IPS team in Quick Heal Technologies Limited. Having worked in the IT security industry for over 11 years, he has worked on various...

Articles by Pradeep Kulkarni »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies