This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Windows host contains a web application that uses a Java
framework that is affected by a potential remote code execution
The version of Apache Struts running on the remote Windows host is
2.3.x. It is, therefore, potentially affected by a remote code
execution vulnerability in the Struts 1 plugin showcase app in the
ActionMessage class due to improper validation of user-supplied input
passed via error messages. An unauthenticated, remote attacker can
exploit this to execute arbitrary code.
Note that Nessus has not tested for this issue but has instead
relied only on the application's self-reported version number.
See also :
Refer to the vendor advisory for recommendations on passing data
to the 'ActionMessage' class.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 9.0
Public Exploit Available : true