This host is running Apache Struts2 and is prone to arbitrary java method execution vulnerabilities.
Successful exploitation will allow remote attackers to execute arbitrary commands via specially crafted OGNL (Object-Graph Navigation Language) expressions.
Upgrade to Apache Struts 2 version 188.8.131.52 or later, For updates refer to http://struts.apache.org
Flaw is due to improper handling of the includeParams attribute in the URL and Anchor tags
Apache Struts 2 before 184.108.40.206
Send a crafted data like system functions via HTTP POST request and check whether it is executing the java function or not.
Updated on 2015-03-25