RULE(RULE ID:321755)

Rule General Information
Release Date: 2014-03-11
Rule Name: Apache Struts OGNL Command Execution Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: Apache Struts is a Model-View-Controller (MVC) framework for building Java-based web applications. Struts allows the use of OGNL expressions in its tag library to denote parameter values. OGNL expressions allow direct member access, a malicious request parameter can be used to set the allowStaticMethodAccess field to be true.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Solaris, Other Unix, FreeBSD, Linux
Reference: SecurityFocusBID:60167
http://struts.apache.org/development/2.x/docs/s2-014.html
https://bugzilla.redhat.com/show_bug.cgi?id=967656
https://cwiki.apache.org/confluence/display/WW/S2-014
Solutions
More advisories have been published on the website, please visit for more suggestions:
http://struts.apache.org/development/2.x/docs/s2-014.html