Apache.Struts.2.XSLTResult.File.Inclusion

description-logoDescription

This indicates an attack attempt to exploit a Remote File Inclusion vulnerability in Apache Struts 2 web application framework.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.

affected-products-logoAffected Products

Apache Struts 2 2.0.0 - 2.3.28 (except 2.3.20.2 and 2.3.24.2)

Impact logoImpact

System Compromise: Remote attackers can execute arbitrary code in the context of the affected application.

recomended-action-logoRecommended Actions

Refer to the vendor's advisory for updates:
http://struts.apache.org/docs/s2-031.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-10 14.629 Severity:high:critical