Intrusion Prevention

Apache.Struts.2.REST.Plugin.XStream.Handler.Code.Execution

Description

This indicates an attack attempt to exploit a Remote Code Execution vulnerability in Apache Struts.
The vulnerability is caused by an error when the REST plugin with XStream handler deserialises XML requests. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.

Affected Products

Apache Software Foundation Struts 2.5 to 2.5.12

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the latest update from the vendor
https://cwiki.apache.org/confluence/display/WW/S2-052

CVE References

CVE-2017-9805