Apache.Struts.2.REST.Plugin.XStream.Handler.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Apache Struts.
The vulnerability is caused by an error when the REST plugin with XStream handler deserialises XML requests. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.
Affected Products
Apache Software Foundation Struts 2.5 to 2.5.12
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the latest update from the vendor
https://cwiki.apache.org/confluence/display/WW/S2-052
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |