[GHSA-43mq-6xmg-29vm] Apache Struts file upload logic is flawed#5399
[GHSA-43mq-6xmg-29vm] Apache Struts file upload logic is flawed#5399advisory-database[bot] merged 1 commit intogithub:chximn-dt/advisory-improvement-5399from chximn-dt:chximn-dt-GHSA-43mq-6xmg-29vm
Conversation
aa7b0e8
into
github:chximn-dt/advisory-improvement-5399
|
Hi @chximn-dt! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
|
Hi @shelbyc, do you have any insights into this? |
|
Hi @chximn-dt, thank you for pinging me! The PR was merged erroneously before I had a chance to review the changes. I agree with your suggestion to add apache/struts@1ecfbae, apache/struts@3ef9ade, and https://www.dynatrace.com/news/blog/the-anatomy-of-broken-apache-struts-2-a-technical-deep-dive-into-cve-2024-53677/ to the references, as well as the decision to add CWE-915. Those changes have been incorporated into the advisory, and your credit is still in the advisory. With respect to changing the patched version from 6.4.0 to 7.0.0, I don't think I agree with the idea that the issue is only fully mitigated with the complete removal of |
|
Hi @shelbyc, thanks for the prompt reply. I agree with the idea that the issue is not only fully mitigated by the complete removal of However, projects using these versions that haven't been updated to use A version should be considered as vulnerable even if there is a workaround available. |
Updates
Comments
>=6.4.0, < 7.0.0are still vulnerable