{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2017-5638","title":"Title"},{"category":"description","text":"The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2017-5638","url":"https://www.suse.com/security/cve/CVE-2017-5638"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1028798 for CVE-2017-5638","url":"https://bugzilla.suse.com/1028798"},{"category":"external","summary":"SUSE Bug 1029412 for CVE-2017-5638","url":"https://bugzilla.suse.com/1029412"},{"category":"external","summary":"SUSE Bug 1029417 for CVE-2017-5638","url":"https://bugzilla.suse.com/1029417"},{"category":"external","summary":"Advisory link for TID7018703","url":"https://www.suse.com/support/kb/doc/?id=7018703"},{"category":"external","summary":"Advisory link for TID7018709","url":"https://www.suse.com/support/kb/doc/?id=7018709"}],"title":"SUSE CVE CVE-2017-5638","tracking":{"current_release_date":"2025-02-08T06:34:16Z","generator":{"date":"2023-02-15T04:49:49Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2017-5638","initial_release_date":"2023-02-15T04:49:49Z","revision_history":[{"date":"2023-02-15T04:49:49Z","number":"2","summary":"Current version"},{"date":"2025-01-01T09:09:40Z","number":"3","summary":"Current version"},{"date":"2025-02-08T06:34:16Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}