CVE-2024-53677 Overview
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable path traversal, and under some circumstances, this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Critical Impact
This vulnerability allows for remote code execution through crafted malicious file uploads.
Affected Products
- Apache Struts 2.0.0 before 6.4.0
Discovery Timeline
- Not Available - Vulnerability discovered by Not Available
- Not Available - Responsible disclosure to Apache
- Not Available - CVE CVE-2024-53677 assigned
- Not Available - Apache releases security patch
- 2024-12-11 - CVE CVE-2024-53677 published to NVD
- 2025-07-15 - Last updated in NVD database
Technical Details for CVE-2024-53677
Vulnerability Analysis
The vulnerability arises from improper file upload parameter handling, allowing attackers to perform path traversal. This can lead to the upload of malicious files, potentially enabling remote code execution.
Root Cause
The root cause is the flawed logic in the FileuploadInterceptor, which improperly sanitizes file paths during upload.
Attack Vector
The vulnerability can be exploited remotely via network access by sending crafted file upload requests.
// Example exploitation code (sanitized)
public void exploit(StrutsRequest req) {
req.addFile("../../../../malicious.jar");
req.send();
}
Detection Methods for CVE-2024-53677
Indicators of Compromise
- Malicious file uploads with unexpected paths
- Suspicious file creation under application directories
- Anomalous application behavior or crashes
Detection Strategies
Utilize intrusion detection systems (IDS) to monitor for unusual file upload patterns, and employ file integrity checks on server directories.
Monitoring Recommendations
Continuously monitor log files for irregular file upload requests and implement alerts for unauthorized access attempts.
How to Mitigate CVE-2024-53677
Immediate Actions Required
- Upgrade to Apache Struts version 6.4.0 or later
- Disable the old file upload logic
- Employ strict input validation and file type checks
Patch Information
Update your Apache Struts deployments to version 6.4.0. Follow the guidance at Apache Struts File Upload.
Workarounds
Disable the vulnerable FileuploadInterceptor and switch to the new file upload mechanism provided by Struts.
# Configuration example
sed -i '/FileuploadInterceptor/d' struts.xml
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

