Security Fixes for Apache Struts Jakarta Multipart Parser

Number: AV17-028
Date: 10 March 2017


The purpose of this advisory is to raise awareness of Security Fixes for Apache Struts Jakarta Multipart Parser. A software upgrade and a work around are now available.


Security fixes and a workaround to address a vulnerability in Apache Struts Jakarta Multipart Parser has been released. The vulnerability could allow an attacker to achieve a remote code execution. The severity of the issue is critical.

Versions affected:

Suggested action

CCIRC recommends that system administrators test and deploy the vendor-released updates or work around to affected applications accordingly.


CVE: CVE-2017-5638

7 March 2017 - Struts General Availability

Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589

Date modified: