Intrusion Prevention

Apache.Struts.2.Wildcard.Matching.OGNL.Code.Execution

Description

This indicates an attack attempt to exploit a Code Execution vulnerability in Apache Struts OGNL expressions.
The vulnerability is due to flaw in OGNL when the vulnerable application is handling a Wildcard matching the action name of a HTTP request to the server. A remote attacker may be able to exploit this to execute arbitrary code execution within the context of the System, via a crafted HTTP request.

Affected Products

Apache Software Foundation Struts 2 prior to 2.3.14.3

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Refer to the vendor's website for suggested workaround.
http://struts.apache.org/development/2.x/docs/s2-015.html

CVE References

CVE-2013-2134 CVE-2013-2135