SynopsisThe remote Windows host contains a web application that uses a Java framework that is affected by a potential remote code execution vulnerability.
DescriptionThe version of Apache Struts running on the remote Windows host is 2.3.x. It is, therefore, potentially affected by a remote code execution vulnerability in the Struts 1 plugin showcase app in the ActionMessage class due to improper validation of user-supplied input passed via error messages. An unauthenticated, remote attacker can exploit this to execute arbitrary code.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionRefer to the vendor advisory for recommendations on passing data to the 'ActionMessage' class.