RULE(RULE ID:337876)

Rule General Information
Release Date: 2024-03-26
Rule Name: Dahua DSS ST2-045 login_login.action Remote Code Execution Vulnerability (CVE-2017-5638)
Severity:
CVE ID:
Rule Protection Details
Description: The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. Dahua DSS introduced this vulnerability using this open-source component, which is used to detect the remote code execution vulnerability of Dahua DSS ST2-045.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:96729
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt
https://cwiki.apache.org/confluence/display/WW/S2-046
https://cwiki.apache.org/confluence/display/WW/S2-045
Solutions
Refer to the announcement or patch by the vendor: https://cwiki.apache.org/confluence/display/WW/S2-045