Three Apache Struts2 vulnerabilities have been found which may allow remote command execution and XSS [1].
Airlock WAF protects against known exploits of S2-028 and S2-030. Double OGNL evaluation (S2-029) can be prevented with a virtual patch on Airlock WAF by configuring a custom Deny Rule with the parameter value pattern:
%{
Case-sensitive = OFF
Invert = OFF
If you are using a vulnerable Apache Struts2 version on a back-end application we strongly recommend to update Struts2 to version 2.3.28 or higher [1]. If you can not update immediately as well as exclude the possibility of an exploitation we recommend to configure at least the described virtual patch until Struts2 is updated.