Skip to main content
Hitachi Vantara Knowledge

Apache Struts Remote Code Execution Vulnerability

Priority:  High

Status: Monitoring

 

First Published: 2023 December 11

Advisory Version: 2.4

References: CVE-2023-50164

 

Summary

The Apache Struts Group recently announced a vulnerability affecting certain versions of Struts, where an attacker could potentially remotely execute code via upload of a malicious file. Additional information about this vulnerability is available here.

The affected versions of Apache Struts are:

  • Struts 2.0.0 - Struts 2.3.37 (End-of-Life)
  • Struts 2.5.0 - Struts 2.5.32
  • Struts 6.0.0 - Struts 6.3.0

This vulnerability has since been fixed in Struts v2.5.33 or greater, and Struts v6.3.0.2 or greater.

Affected Products

Vulnerable Products

Hitachi Vantara is currently investigating its product lines to determine if any are affected by this vulnerability. If any products or solutions are found to be impacted, they will be indicated in this section, in subsequent updates to this advisory, along with information regarding fixed release versions (if such information is available at the time.) Likewise, any products or solutions that have been confirmed not to be affected by the given vulnerability will be listed in the section below.

NOTE: Cited product documentation, including product-specific Alerts and Technical Bulletins, are available to Hitachi Vantara customers logged into Support Connect.

Product Notes
Content Products
Content Platform CVE-2023-50164:  Vulnerable.  An affected version of Struts is in use. The HCP 9.6.3 release will upgrade the Struts version.
Content Platform S Series

CVE-2023-50164:  Vulnerable (see specific details below)

Customers running HCPS 2.2.3 software on S10/S30 systems are vulnerable to CVE-2023-50164.

Customers running HCPS 3.1.6  software on S11/S31 systems are vulnerable to CVE-2023-50164.

Hotfix 1 versions of 2.2.3 and 3.1.6 HCPS software will be created to address CVE-2023-50164

Content Platform Anywhere CVE-2023-50164: Vulnerable.  An affected version of Struts is in use.  But, Struts is only used in the Management Console of AW which is behind a firewall.  It is not used on the User portal. AW release 4.6.0 HF2  will upgrade the Struts version.

Products Confirmed Not Vulnerable

* As this is an ongoing investigation across all Hitachi Vantara product lines, please note that products may be reclassified as vulnerable as they continue to be evaluated for risk as additional information pertaining to CVE-2023-50164 is released.

Product Notes
Storage Products
Hitachi Virtual Storage Platform VSP E990, VSP E790, VSP E590 CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP G130, F/G350, VSP F/G370, VSP F/G700, VSP F/G900 CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP G200, VSP F/G/N400, VSP F/G/N600, VSP F/G/N800 CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP 5100,  VSP 5100H,  VSP 5500, VSP 5500H
(VSP 5x00) RAID 900
CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform VSP 5200,  VSP 5200H,  VSP 5600, VSP 5600H
(VSP 5x00) RAID 900
CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform G1000, F/G1500
(VSP F/G1x00) RAID 800
CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Virtual Storage Platform (VSP) RAID 700 CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Unified Storage VM (HUS VM) HM700 CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Adaptable Modular Storage DF800S, DF800M, DF800H (AMS 2x00) CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Unified Storage DF850XS, DF850S, DF850MH (HUS 1x0) CVE-2023-50164: Not vulnerable. Affected components not used
Content Products
Content Intelligence CVE-2023-50164: Not vulnerable. HCI/HCM does not use Apache Struts
Content Platform S Series

CVE-2023-50164: Customers who upgrade to HCPS 3.2.0 software on S11/S31 systems are NOT vulnerable.  A scan of the packages installed as part of HCPS 3.2.0 will show version 2.5.30 of the Struts core library, but it is not used in the HCPS 3.2.0 code base. The entire UI in HCPS 3.2.0 was rewritten to use the East framework but the older Struts based code is still present in the distribution (not active). The inactive Struts based code will be removed in a future release.

Content Software for File CVE-2023-50164: Not vulnerable. The OS doesn't include the JAVA framework.  We do not include the Struts libraries.
Content Platform Gateway CVE-2023-50164: Not vulnerable. Apache Struts not used in Gateway.
Data Ingestor

CVE-2023-50164: Not vulnerable. The file storage product (HDI OS/HFSM) does not use the affected version (2.x or 6.x) of Apache Struts

HCP for Cloud Scale CVE-2023-50164: Not vulnerable. Apache Struts not used in CS.
Content Platform Anywhere Enterprise CVE-2023-50164: Not vulnerable. Apache Struts not used in HCP AWE.
Software Products
Hitachi Remote Ops CVE-2023-50164: Not vulnerable. Apache Struts is not used.
Hitachi Virtual Storage System Block  (VSSB) CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Ops Center Administrator/HSA CVE-2023-50164: Not vulnerable. Apache Struts is not used.
Hitachi Ops Center Analyzer/Analyzer Probe/Analyzer Detail View CVE-2023-50164: Not vulnerable. Apache Struts is not used.
Hitachi Ops Center Protector/HDID CVE-2023-50164: Not vulnerable. Apache Struts is not used.
CM-REST CVE-2023-50164: Not vulnerable. Apache Struts is not used.
CCI/RAID Manager CVE-2023-50164: Not vulnerable. Apache Struts is not used.
Advanced Reporter CVE-2023-50164: Not vulnerable. Apache Struts is not used.
Hitachi Automation Director (HAD) CVE-2023-50164: Not vulnerable. Affected components not used
Hitachi Infrastructure Analytics Advisor (HIAA) CVE-2023-50164: Not vulnerable. Affected components not used
UCP Advisor CVE-2023-50164: Not vulnerable. Affected components not used

 

Recommended Actions

Please continue to check this Security Advisory as new information will be added to it as it becomes available.

If any of the information presented above remains unclear, please contact the Hitachi Vantara Global Support Center, or your Vantara-authorized service and support provider.

The information contained herein is for informational purposes only. It is not intended as a guaranty or warranty about Hitachi Vantara’s products, including any guaranty or warranty that any product cannot be exploited by third parties. All product warranties and obligations to a customer must be specified in a mutually acceptable and executed contract between the parties.

 

 

  • Was this article helpful?