HTTP: Apache Struts2 Dymanic Method Invocation Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Apache Struts2 Dymanic Method Invocation. A successful attack can lead to arbitrary code execution.

Extended Description

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.

Affected Products

Oracle siebel_e-billing

Short Name
HTTP:APACHE:STRUTS2DMI-RCE
Severity
Critical
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Apache CVE-2016-3081 Code Dymanic Execution Invocation Method Remote Struts2
Release Date
05/03/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Apache

Oracle

CVSS Score

9.3

Found a potential security threat?