This module exploits a remote code execution vulnerability in Apache Struts version 2.3 - 2.3.4, and 2.5 -2.5.6. Remote code execution can be performed via an endpoint that makes use of a redirect action. Native payloads will be converted to executables and dropped in the server temp dir. If this fails, try a cmd/* payload, which will not have to write to the disk. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None