'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-09-02 | |
| Rule Name: | Apache Struts2 OGNL Remote Code Execution Vulnerability | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Apache Struts2 is an open-source project of the Apache Software Foundation. It is an open-source MVC framework used for building enterprise-level Java web applications. However, in certain versions (or under specific misconfigurations), Struts2 may directly interpret user-controllable parameters as OGNL expressions, which can lead to remote command execution. | |
| Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |