The remote web server contains a web application that uses a Java framework that is affected by a remote code execution vulnerability.
The version of Apache Struts running on the remote host is affected by a remote code execution vulnerability in the Jakarta Multipart parser due to improper handling of the Content-Type header. An unauthenticated, remote attacker can exploit this, via a specially crafted Content-Type header value in the HTTP request, to potentially execute arbitrary code, subject to the privileges of the web server user.
Upgrade to Apache Struts version 2.3.32 / 220.127.116.11 or later. Alternatively, apply the workaround referenced in the vendor advisory.