{"id":426,"date":"2017-03-09T22:49:04","date_gmt":"2017-03-09T22:49:04","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=426"},"modified":"2017-03-09T22:49:04","modified_gmt":"2017-03-09T22:49:04","slug":"apache-struts2-remote-code-execution-vulnerability-s2-045","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-struts2-remote-code-execution-vulnerability-s2-045\/","title":{"rendered":"Apache Struts2 Remote Code Execution Vulnerability (S2-045)"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>Apache Struts2 is prone to a remote code execution vulnerability (CNNVD-201703-152) in the Jakarta Multipart parser plug-in. When uploading a file with this plug-in, an attacker could change the value of the Content-Type header field of an HTTP request to trigger this vulnerability, causing remote code execution.<\/p>\n<p>For details, visit the following link:<\/p>\n<p><a href=\"https:\/\/cwiki.apache.org\/confluence\/display\/WW\/S2-045?from=timeline&amp;isappinstalled=0\"><strong>https:\/\/cwiki.apache.org\/confluence\/display\/WW\/S2-045?from=timeline&amp;isappinstalled=0<\/strong><\/a><\/p>\n<h3>Affected Versions<\/h3>\n<ul>\n<li>Struts 2.3.5 &#8211; Struts 2.3.31<\/li>\n<li>Struts 2.5 &#8211; Struts 2.5.10<\/li>\n<\/ul>\n<h3>Unaffected Versions<\/h3>\n<ul>\n<li>Struts 2.3.32<\/li>\n<li>Struts 2.5.10.1<\/li>\n<\/ul>\n<h3>Geographic Distribution of Struts2 Vulnerability<\/h3>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP1.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-428\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP1-300x147.png\" alt=\"\" width=\"700\" height=\"343\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP1-300x147.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP1-768x376.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP1.png 829w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP2.png\"><img decoding=\"async\" class=\"alignnone wp-image-429\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP2-300x244.png\" alt=\"\" width=\"701\" height=\"570\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP2-300x244.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP2-768x623.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP2.png 829w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/a><\/p>\n<h2>Vulnerability Analysis<\/h2>\n<p>Apache Struts2 is prone to a remote code execution vulnerability via the Content-Type header field of an HTTP request, an attacker could deliver malicious code to a vulnerable server causing remote code execution.<\/p>\n<p><strong>1. Vulnerability POC<\/strong><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP3.png\"><img decoding=\"async\" class=\"alignnone wp-image-430\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP3-300x229.png\" alt=\"\" width=\"700\" height=\"534\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP3-300x229.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP3-768x587.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP3.png 827w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>2. Vulnerability Verification<\/strong><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-431\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP4-300x210.png\" alt=\"\" width=\"700\" height=\"490\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP4-300x210.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP4-768x538.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP4.png 827w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>3. Detailed Analysis<\/strong><\/p>\n<p>It is possible to perform a RCE attack with a malicious Content-Type value. If the Content-Type value isn&#8217;t valid an exception is thrown which is then used to display an error message to a user. The preceding is the official vulnerability description.<\/p>\n<p>As illustrated this vulnerability is due to the mishandling of error messages by Strust2. This vulnerability allows an attacker to inject OGNL expressions via the Content-Type header field to execute arbitrary code. The vulnerability analysis here targets Struts 2.3.24.The vulnerability POC shown below reveals how the attack commands are delivered to a vulnerable server via the Content-Type header field.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-432\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP5-300x95.png\" alt=\"\" width=\"701\" height=\"222\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP5-300x95.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP5-768x243.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP5.png 827w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/a><\/p>\n<p>Due to the existence of #nike=&#8217;multipart\/form-data&#8217; amid parameters passed to the vulnerable server, the result of content_type.contains(&#8220;multipart\/form-data&#8221;) is true, paving the way for the passing of attack code to the server.<\/p>\n<p>During attack code passing to the server, &#8220;cat \/etc\/passwd&#8221; is assigned to the #cmd parameter. Then (#cmds=(#iswin?{&#8216;cmd.exe&#8217;,&#8217;\/c&#8217;,#cmd}:{&#8216;\/bin\/bash&#8217;,&#8217;-c&#8217;,#cmd}) is executed to check the operating system type of the target host. After that, values are assigned to parameters to directive selectively.<\/p>\n<p><em>The attack command to execute is as follows:<\/em><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-433\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP6-300x29.png\" alt=\"\" width=\"703\" height=\"68\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP6-300x29.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP6-768x75.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP6.png 829w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><\/p>\n<p>The entry of Struts2, FilterDispatcher.java first executes the doFilter function, then dispatcher.wrapRequest, and finally dispatcher.wrapRequest for request processing. The following figure shows the request wrapping method handling of the prepareDispatcherAndWrapRequest function.<\/p>\n<p><em>The following figure depicts the command injection points:<\/em><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-435\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP8-300x170.png\" alt=\"\" width=\"701\" height=\"397\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP8-300x170.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP8-768x434.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP8.png 867w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/a><\/p>\n<p>For dispatcher.wrapRequest, when Content-Type is set to multipart\/form-data, the MultiPartRequestWrapper function will be called for rapping upload requests transmitted in various ways that include Jakarta.<\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-436\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP9-300x100.png\" alt=\"\" width=\"702\" height=\"234\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP9-300x100.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP9-768x257.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP9.png 811w\" sizes=\"(max-width: 702px) 100vw, 702px\" \/><\/a><\/p>\n<p><em>MultiPartRequestWrapper.java wraps the parse function:<\/em><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-437\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP10-300x117.png\" alt=\"\" width=\"700\" height=\"273\" \/><\/a><\/p>\n<p><em>The following figures shows the parse function:<\/em><\/p>\n<p><a href=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-438\" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP11-300x131.png\" alt=\"\" width=\"701\" height=\"306\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP11-300x131.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP11-768x335.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP11.png 829w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/a><\/p>\n<h3>Fix Action &amp; Patch Link<\/h3>\n<p><em>Apache Struts 2.5.10.1:<\/em><\/p>\n<p><a href=\"https:\/\/github.com\/apache\/struts\/commit\/b06dd50af2a3319dd896bf5c2f4972d2b772cf2b\"><strong>https:\/\/github.com\/apache\/struts\/commit\/b06dd50af2a3319dd896bf5c2f4972d2b772cf2b<\/strong><\/a><\/p>\n<p><em>Apache Struts 2.3.32:<\/em><\/p>\n<p><a href=\"https:\/\/github.com\/apache\/struts\/commit\/352306493971e7d5a756d61780d57a76eb1f519a\"><strong>https:\/\/github.com\/apache\/struts\/commit\/352306493971e7d5a756d61780d57a76eb1f519a<\/strong><\/a><\/p>\n<h3>Vendor Solutions<\/h3>\n<p>Users are advised to upgrade Apache Struts to the latest secure version (Struts 2 2.3.32 or Struts 2.5.10.1) by downloading the updates from the vendor&#8217;s official websites:<\/p>\n<p><em>Struts 2.3.32:<\/em><\/p>\n<p><a href=\"https:\/\/github.com\/apache\/struts\/releases\/tag\/STRUTS_2_3_32\"><strong>https:\/\/github.com\/apache\/struts\/releases\/tag\/STRUTS_2_3_32<\/strong><\/a><\/p>\n<p><em>Struts 2.5.10.1:<\/em><\/p>\n<p><a href=\"https:\/\/github.com\/apache\/struts\/releases\/tag\/STRUTS_2_5_10_1\"><strong>https:\/\/github.com\/apache\/struts\/releases\/tag\/STRUTS_2_5_10_1<\/strong><\/a><\/p>\n<h2>Recommended Solutions<\/h2>\n<p>For external assets, use the emergency vulnerability detection service of NSFOCUS Cloud to check the vulnerability online. The services are available through the following links:<\/p>\n<p><a href=\"http:\/\/t.cn\/RipBq1c\"><strong>http:\/\/t.cn\/RipBq1c<\/strong><\/a><\/p>\n<p><em>Remote Security Assessment System (RSAS V6):<\/em><\/p>\n<p><a href=\"http:\/\/update.nsfocus.com\/update\/listRsasDetail\/v\/vulweb\"><strong>http:\/\/update.<\/strong><strong>nsfocus<\/strong><strong>.com\/update\/listRsasDetail\/v\/vulweb<\/strong><\/a><\/p>\n<p><em>Web Vulnerability Scanning System (WVSS):<\/em><\/p>\n<p><a href=\"http:\/\/update.nsfocus.com\/update\/listWvss\">http:\/\/update.nsfocus.com\/update\/listWvss<\/a><\/p>\n<p><em>NSFOCUS Network Intrusion Prevention System (NIPS):<\/em><\/p>\n<p><a href=\"http:\/\/update.nsfocus.com\/update\/listIps\"><strong>http:\/\/update.nsfocus.com\/update\/listIps<\/strong><\/a><\/p>\n<p><em>NSFOCUS Intrusion Detection System (NIDS):<\/em><\/p>\n<p><a href=\"http:\/\/update.nsfocus.com\/update\/listIds\"><strong>http:\/\/update.nsfocus.com\/update\/listIds<\/strong><\/a><\/p>\n<p><em>NSFOCUS Next-Generation Firewall (NF):<\/em><\/p>\n<p><a href=\"http:\/\/update.nsfocus.com\/update\/listNf\"><strong>http:\/\/update.nsfocus.com\/update\/listNf<\/strong><\/a><\/p>\n<p><em>NSFOCUS Web Application Firewall (WAF):<\/em><\/p>\n<p><a href=\"http:\/\/update.nsfocus.com\/update\/wafIndex\"><strong>http:\/\/update.nsfocus.com\/update\/wafIndex<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Apache Struts2 is prone to a remote code execution vulnerability (CNNVD-201703-152) in the Jakarta Multipart parser plug-in. When uploading a file with this plug-in, an attacker could change the value of the Content-Type header field of an HTTP request to trigger this vulnerability, causing remote code execution. For details, visit the following link: https:\/\/cwiki.apache.org\/confluence\/display\/WW\/S2-045?from=timeline&amp;isappinstalled=0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":455,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[7,20],"tags":[],"class_list":["post-426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Apache Struts2 is prone to a remote code execution vulnerability (CNNVD-201703-152) in the Jakarta Multipart parser plug-in. When uploading a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-09T22:49:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Apache Struts2 is prone to a remote code execution vulnerability (CNNVD-201703-152) in the Jakarta Multipart parser plug-in. When uploading a\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Apache Struts2 Remote Code Execution Vulnerability (S2-045)\",\"datePublished\":\"2017-03-09T22:49:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/\"},\"wordCount\":600,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/AP13.jpeg\",\"articleSection\":[\"Global Events\",\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/\",\"name\":\"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/AP13.jpeg\",\"datePublished\":\"2017-03-09T22:49:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/AP13.jpeg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/AP13.jpeg\",\"width\":400,\"height\":400,\"caption\":\"Blue geometric abstract logo on white background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-struts2-remote-code-execution-vulnerability-s2-045\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache Struts2 Remote Code Execution Vulnerability (S2-045)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS","og_description":"Overview Apache Struts2 is prone to a remote code execution vulnerability (CNNVD-201703-152) in the Jakarta Multipart parser plug-in. When uploading a","og_url":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/","og_site_name":"NSFOCUS","article_published_time":"2017-03-09T22:49:04+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS","twitter_description":"Overview Apache Struts2 is prone to a remote code execution vulnerability (CNNVD-201703-152) in the Jakarta Multipart parser plug-in. When uploading a","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Apache Struts2 Remote Code Execution Vulnerability (S2-045)","datePublished":"2017-03-09T22:49:04+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/"},"wordCount":600,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg","articleSection":["Global Events","Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/","url":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/","name":"Apache Struts2 Remote Code Execution Vulnerability (S2-045) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg","datePublished":"2017-03-09T22:49:04+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2017\/03\/AP13.jpeg","width":400,"height":400,"caption":"Blue geometric abstract logo on white background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-struts2-remote-code-execution-vulnerability-s2-045\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache Struts2 Remote Code Execution Vulnerability (S2-045)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/426\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/455"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}