RULE(RULE ID:321903)

Rule General Information
Release Date: 2019-06-21
Rule Name: Apache Struts2 Plugin OGNL Command Execution Vulnerability (CVE-2017-9791)
Severity:
CVE ID:
Rule Protection Details
Description: The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux
Reference: SecurityFocusBID:99484
ExploitDB:42324
http://struts.apache.org/docs/s2-048.html
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
Solutions
Refer to the announcement or patch by the vendor: http://struts.apache.org/docs/s2-048.html