Apache S2-032 Struts RCE

Nash N Sulthan
Published on
01 Oct 2021

Apache Struts 2 is a sophisticated, extensible platform for developing enterprise-grade Java web applications. There is a remote code execution vulnerability in Apache Struts S2-032. This vulnerability exists when Dynamic Method Invocation (DMI) is enabled. Because expressions passed to the server side are not adequately validated using the method: prefix.

Mitigation / Precaution

  • If Direct Method Invocation (DMI) is enabled, disable it.

  • Update your Apache Struts Server, to the latest version to eliminate this vulnerability.

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Nash N Sulthan
Nash N Sulthan
Cyber Security Lead Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment