{"id":214460,"date":"2017-03-09T09:52:41","date_gmt":"2017-03-09T14:52:41","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/hackers-exploit-apache-struts-vulnerability-to-compromise-corporate-web-servers-network-world.php"},"modified":"2017-03-09T09:52:41","modified_gmt":"2017-03-09T14:52:41","slug":"hackers-exploit-apache-struts-vulnerability-to-compromise-corporate-web-servers-network-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/mind-upload\/hackers-exploit-apache-struts-vulnerability-to-compromise-corporate-web-servers-network-world.php","title":{"rendered":"Hackers exploit Apache Struts vulnerability to compromise corporate web servers &#8211; Network World"},"content":{"rendered":"<p><p>Thank you                <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      Attackers are widely exploiting a recently patched      vulnerability in Apache Struts that allows them to remotely      execute malicious code on web servers.    <\/p>\n<p>      Apache Struts is an open-source web development framework for      Java web applications. It's widely used to build corporate      websites in sectors including education, government,      financial services, retail and media.    <\/p>\n<p>      On Monday, the Apache Struts developers fixed      a high-impact vulnerability in the framework's Jakarta      Multipart parser. Hours later, an exploit for the flaw      appeared on Chinese-language websites and this was almost      immediately followed by real-world attacks, according to      researchers from Cisco Systems.    <\/p>\n<p>      The vulnerability is very easy to exploit and allows      attackers to execute system commands with the privileges of      the user running the web server process. If the web server is      configured to run as root, the system is completely      compromised, but executing code as a lower-privileged user is      also a serious security threat.    <\/p>\n<p>      What's even worse is that the Java web application doesn't      even need to implement file upload functionality via the      Jakarta Multipart parser in order to be vulnerable.       According to researchers from Qualys, the simple presence      on the web server of this component, which is part of the      Apache Struts framework by default, is enough to allow      exploitation.    <\/p>\n<p>      \"Needless to say we think this is a high priority issue and      the consequence of a successful attack is dire,\" said Amol      Sarwate, director of Vulnerability Labs at Qualys, in            a blog post.    <\/p>\n<p>      Companies who use Apache Struts on their servers should      upgrade the framework to versions 2.3.32 or 2.5.10.1 as soon      as possible.    <\/p>\n<p>      Researchers from Cisco Talos have observed \"a high number of      exploitation events.\" Some of them only execute the Linux      command whoami to determine the privileges of the web server      user and are probably used for initial probing. Others go      further and stop the Linux firewall and then download an ELF      executable that's executed on the server.    <\/p>\n<p>      \"The payloads have varied but include an IRC bouncer, a DoS      bot, and a sample related to the bill gates botnet,\" the      Talos researchers said in       a blog post.    <\/p>\n<p>      According to researchers from Spanish outfit Hack Players,      Google searches indicate 35 million web applications that      accept \"filetype:action\" uploads and a high percentage of      them are likely vulnerable.    <\/p>\n<p>      It's somewhat unusual that attacks have started so quickly      after the flaw was announced and it's not yet clear whether      an exploit for the vulnerability already existed in closed      circles before Monday.    <\/p>\n<p>      Users who can't immediately upgrade to the patched Struts      versions can apply a workaround that consists of creating a      Servlet filter for Content-Type that would discard any      requests not matching multipart\/form-data. Web application      firewall rules to block such requests are also available from      various vendors.    <\/p>\n<p>        Lucian Constantin is an IDG News Service correspondent. He        writes about information security, privacy, and data        protection.      <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.networkworld.com\/article\/3178657\/security\/hackers-exploit-apache-struts-vulnerability-to-compromise-corporate-web-servers.html\" title=\"Hackers exploit Apache Struts vulnerability to compromise corporate web servers - Network World\">Hackers exploit Apache Struts vulnerability to compromise corporate web servers - Network World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Thank you Your message has been sent. There was an error emailing this page. Attackers are widely exploiting a recently patched vulnerability in Apache Struts that allows them to remotely execute malicious code on web servers.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/mind-upload\/hackers-exploit-apache-struts-vulnerability-to-compromise-corporate-web-servers-network-world.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[16],"tags":[],"class_list":["post-214460","post","type-post","status-publish","format-standard","hentry","category-mind-upload"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/214460"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=214460"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/214460\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=214460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=214460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=214460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}