CVE-2017-5638 - MergeBase Vulnerability Database
Risk Score
High severity
Out of 10
Mar 11, 2017
Feb 24, 2021


The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
MergeBase Comment

The famous Struts CVE! It's not every day that an open source library leads to a 96 page congressional report!

We suspect more than a few cyber security startups launched in the wake of this incredible bug - and MergeBase is one of them.

The bug itself is incredible - a work of true genius - and we encourage all software engineers to study it (especially those comfortable with Java). The contortions required by the first attacker to exploit this are unbelievable, but the payoff was devastating: full remote-code-execution.

Common Weakness Enumeration (CWE)

Discover More from MergeBase

Open Source Protection

Stay on top of the real risk of open source at any time.

Avoid false positives and get sophisticated upgrade guidance based on risk, compatibility and popularity.

More on Continuous Protection

Add RunTime Protection

Detect and defend against known-vulnerabilities at runtime. The only SCA to do so.

The quickest way to respond to an imminent threat like log4j with CVE-2021-44228.

More on Run-time Protection

Shift Left Now

CodeGreen is an early-warning defence for your in-house development and integrates directly into GitHub and BitBucket

More on BitBucket and Github apps