This indicates an attack attempt to exploit a Remote File Inclusion vulnerability in Apache Struts 2 web application framework.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.
Apache Struts 2 2.0.0 - 2.3.28 (except 22.214.171.124 and 126.96.36.199)
System Compromise: Remote attackers can execute arbitrary code in the context of the affected application.
Refer to the vendor's advisory for updates: