A vulnerability is relevant if the Apache Struts system adopts the "Struts 2 Struts 1 plugin". A remote attacker could exploit the vulnerability by sending special crafted URL requests to the affected system to allow remote code execution.
A successful attack could lead to arbitrary code execution on an affected system.
Administrators of the affected systems should follow the recommendations provided by the Apache Software Foundation for Struts below and take immediate actions to mitigate the risk.
For details, please refer to
http://struts.apache.org/docs/s2-048.html
http://struts.apache.org/docs/s2-048.html
http://struts.apache.org/announce.html#a20170707
http://www.cnvd.org.cn/flaw/show/CNVD-2017-13259
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9791