Two Apache Struts2 vulnerabilities have been found which may allow remote code execution [1,2].
Affected versions:
If you are using a vulnerable Apache Struts2 version on a back-end application we strongly recommend to update Struts2 to version 2.3.28.1 or higher.
Alternatively, S2-032 can be prevented by disabling Dynamic Method Invocation or by configuring a custom Deny Rule on Airlock WAF with the parameter value pattern:
method:
Case-sensitive = OFF
Invert = OFF
S2-031 can be prevented by implementing your own XSLTResult based on code of the versions Struts 2.3.20.3, Struts 2.3.24.3 or Struts 2.3.28.1.