CyberSecurity SEE

Organizations Rush to Address Actively Exploited Flaw in Struts 2

Organizations Rush to Address Actively Exploited Flaw in Struts 2

A critical vulnerability in Apache Struts 2 has been identified, one that could potentially be exploited by malicious actors. The issue at hand, known as CVE-2024-53677, comes with a CVSS score of 9.5, making it a high-risk vulnerability. Apache Struts 2, an open-source framework for building Java applications, has been around for quite some time and is still prevalent in older legacy systems across various industries.

The reason why fixing this vulnerability is not as simple as downloading a patch lies in the outdated nature of Struts 2. As newer technologies and security practices have evolved over time, the components of Struts 2 have become less integrated with modern Continuous Integration/Continuous Deployment (CI/CD) pipelines. Updating the Struts 2 library, building and deploying a new version of a vulnerable application now require more manual effort and take significantly longer. This extended window of vulnerability creates an opportunity for attackers to exploit the weakness.

Expert opinions on the matter suggest that the exploitation of this vulnerability may continue for weeks as organizations identify and address all instances of Struts 2 usage. Last year, a similar vulnerability, CVE-2023-50164, was disclosed, showcasing the ongoing challenges with securing Apache Struts 2. The new vulnerability, CVE-2024-53677, shares similarities with CVE-2023-50164 as both involve the File Upload Interceptor component of Struts 2, enabling remote code execution via path traversal.

Active exploitation attempts have already been observed, with attackers utilizing public proof-of-concept scripts to exploit the vulnerability. This heightened activity underscores the urgency for organizations to address this issue promptly. However, applying patches for CVE-2024-53677 is not a straightforward process. Organizations are required to upgrade to the latest version of Struts, specifically version 6.7.0 or at least version 6.4.0, which deprecated the problematic File Upload Interceptor.

The complexity of migrating to the updated version of Struts lies in the need for code rewrites, configuration adjustments, and potential disruptions to existing applications. The process can be challenging, particularly for organizations with intricate plugin chains and layered frameworks. Extensive regression testing is also necessary to ensure the new implementation works seamlessly.

The scope of impact for CVE-2024-53677 has prompted national cybersecurity centers in several countries to issue urgent warnings. While Apache Struts 2 may not be as popular today as it once was, it still lingers in legacy systems, especially in regulated industries like finance, insurance, and government. The presence of Struts 2 in these critical systems underscores the importance of addressing technical debt and maintaining up-to-date frameworks to mitigate security risks.

In conclusion, the discovery of CVE-2024-53677 highlights the ongoing challenges organizations face in securing legacy systems. By implementing robust attack surface management and lifecycle management strategies, enterprises can better protect themselves from vulnerabilities like the one found in Apache Struts 2. Vigilance and proactive measures are crucial in today’s complex cybersecurity landscape.

Source link

Exit mobile version