RULE(RULE ID:305527)

Rule General Information
Release Date: 2013-07-22
Rule Name: WEB-SERVER Apache Struts 2 Parametersinterceptor OGNL Command Execution Vulnerability (CVE-2011-3923)
Severity:
CVE ID:
Rule Protection Details
Description: A command execution vulnerability was found in Apache Struts2. The vulnerability is caused by deficient input validation in the ParametersInterceptor component when parsing incoming HTTP requests.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Solaris, FreeBSD, Windows, Linux, Other Unix, Mac OS, Others
Reference:
Solutions
More advisories have been published on the website, please visit for more suggestions:
http://struts.apache.org/2.x/docs/s2-009.html