Service Notices

All Notices > Security Notices > Apache Struts Security Bulletin S2-061: Struts 2 Remote Code Execution Vulnerability (CVE-2020-17530)

Apache Struts Security Bulletin S2-061: Struts 2 Remote Code Execution Vulnerability (CVE-2020-17530)

Dec 09, 2020 GMT+08:00

I. Overview

Apache Struts officially released security bulletin (S2-061) that disclosed a remote code execution vulnerability (CVE-2020-17530). In specific conditions, attackers can construct malicious OGNL expressions to execute any code.

If you are an Apache Struts 2 user, check your system and implement timely security hardening.

References:

https://cwiki.apache.org/confluence/display/WW/S2-061

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

Apache Struts 2.0.0–2.5.25

Secure versions:

Apache Struts 2.5.26 and later versions

IV. Vulnerability Handling

This vulnerability has been fixed in newly released versions. If your service version falls into the affected range, upgrade it to a latest secure version.

https://struts.apache.org/download.cgi

HUAWEI CLOUD WAF can defend against these vulnerabilities. If you are a WAF user, set the basic web protection status to Block. For details, see Enabling Basic Web Protection.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.