The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Apache Struts: code execution via Jakarta Multipart CT

Synthesis of the vulnerability 

An attacker can use a malicious Content-Type header on Apache Struts with Jakarta Multipart installed, in order to run code.
Impacted products: Struts, Cisco CUCM, Cisco Unified CCX, Avamar, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle OIT, Tuxedo, WebLogic, Percona Server, vCenter Server, VMware vSphere.
Severity of this bulletin: 4/4.
Creation date: 08/03/2017.
Revision date: 14/03/2017.
Références of this threat: 498123, CERTFR-2017-ALE-004, CERTFR-2017-AVI-071, cisco-sa-20170310-struts2, cpuapr2017, cpujul2017, CVE-2017-5638, ESA-2017-042, S2-045, S2-046, VIGILANCE-VUL-22047, VMSA-2017-0004, VMSA-2017-0004.6, VU#834067.

Description of the vulnerability 

The Apache Struts product can be configured to use the Multipart parser of Jakarta.

The HTTP Content-Type header can contain the multipart/form-data MIME type to indicate form data. In this case, the Multipart parser of Jakarta is called.

When the Multipart parser of Jakarta is used, and when the Content-Type header contains a malformed multipart/form-data header, an exception occurs, and the header content is interpreted during the display.

An attacker can therefore use a malicious Content-Type header on Apache Struts with Jakarta Multipart installed, in order to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness alert impacts software or systems such as Struts, Cisco CUCM, Cisco Unified CCX, Avamar, MariaDB ~ precise, MySQL Community, MySQL Enterprise, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle OIT, Tuxedo, WebLogic, Percona Server, vCenter Server, VMware vSphere.

Our Vigil@nce team determined that the severity of this weakness note is critical.

The trust level is of type confirmed by the editor, with an origin of internet client.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this weakness bulletin.

Solutions for this threat 

Apache Struts: version 2.5.10.1.
The version 2.5.10.1 is fixed:
  http://struts.apache.org/
  http://struts.apache.org/docs/version-notes-25101.html

Apache Struts: version 2.3.32.
The version 2.3.32 is fixed:
  http://struts.apache.org/
  http://struts.apache.org/docs/version-notes-2332.html

Apache Struts: workaround for Jakarta Multipart.
A workaround is indicated in the information source.

Cisco: solution for Apache Struts.
The solution is indicated in information sources.

EMC Avamar: solution for Apache Struts2.
The solution is indicated in information sources.

MySQL: version 5.5.55.
The version 5.5.55 is fixed.

MySQL: version 5.6.36.
The version 5.6.36 is fixed.

MySQL: version 5.7.18.
The version 5.7.18 is fixed.

Oracle Communications: CPU of April 2017.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2247453.1
  https://support.oracle.com/rs?type=doc&id=2248470.1
  https://support.oracle.com/rs?type=doc&id=2251718.1
  https://support.oracle.com/rs?type=doc&id=2245233.1
  https://support.oracle.com/rs?type=doc&id=2248526.1
  https://support.oracle.com/rs?type=doc&id=2250567.1

Oracle Fusion Middleware: CPU of April 2017.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2228898.1

Oracle Fusion Middleware: CPU of July 2017.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2261562.1

VMware vCenter Server: solution for Apache Struts.
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computer vulnerability bulletins. The technology watch team tracks security threats targeting the computer system.