Remote Code Evaluation will result in the entire web application and web server being compromised.Here RCE is performed over Apache Struts 2 . Remote attackers can execute arbitrary OGNL expressions through a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix in Apache Struts 2.0.0 through 2.3.15.
A lot of information disclosure can happen.The credibility of the system has been completely compromised.The entire system is compromised as a result of a total lack of system security.The affected resource has been fully shut down.The intruder has the ability to make the resource entirely unusable.
In order to patch this vulnerability, please install the official patch Apache Struts 2 made available for supported, vulnerable instances.