Apache Struts 2 - DefaultActionMapper Prefixes OGNL Code Execution

Sooraj V Nair
Published on
16 Jun 2021

Remote Code Evaluation will result in the entire web application and web server being compromised.Here RCE is performed over Apache Struts 2 . Remote attackers can execute arbitrary OGNL expressions through a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix in Apache Struts 2.0.0 through 2.3.15.


A lot of information disclosure can happen.The credibility of the system has been completely compromised.The entire system is compromised as a result of a total lack of system security.The affected resource has been fully shut down.The intruder has the ability to make the resource entirely unusable.

Mitigation / Precaution

In order to patch this vulnerability, please install the official patch Apache Struts 2 made available for supported, vulnerable instances.

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Sooraj V Nair
Sooraj V Nair
Cyber Security Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment