On December 7, Apache released a patch for their open-source Model-View-Controller (MVC) framework, Apache Struts.
This patch is to address a new critical unauthenticated file upload vulnerability that can lead to remote code execution (RCE), assigned to CVE-2023-50164.
Proof of exploit code is publicly available and evidence of active exploitation was observed on December 13.
Many 3rd party vendors leverage the Apache Struts framework in their products. Cisco released an advisory detailing which of their products are affected by the vulnerability, which can be found here.
Update vulnerable versions to the fixed version:
If you have any web-facing sites or applications, please check with your vendor if they leverage Apache Struts, and apply the appropriate patch. All vulnerable Apache Struts instances should be patched immediately.
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.