Apache.Struts.2.REST.Plugin.XStream.Handler.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Apache Struts.
The vulnerability is caused by an error when the REST plugin with XStream handler deserialises XML requests. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.

affected-products-logoAffected Products

Apache Software Foundation Struts 2.5 to 2.5.12

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the latest update from the vendor
https://cwiki.apache.org/confluence/display/WW/S2-052

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-12-07 16.974 Sig Added
2019-07-10 14.646 Sig Added
2019-06-13 14.632 Severity:critical:high