The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5638.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.7.1.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.8.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.7.1.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.8.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.7.1.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.8.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.7.1.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.8.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.3.6.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.1.3.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.6.5"
}
]
}
]