Apache Struts before 2.3.1.1 is susceptible to remote code execution. When developer mode is used in the DebuggingInterceptor component, a remote attacker can execute arbitrary OGNL commands via unspecified vectors, which can allow for execution of malware, obtaining sensitive information, modifying data, and/or gaining full control over a compromised system without entering necessary credentials.. NOTE: the vendor characterizes this behavior as not “a security vulnerability itself.”
View the template here CVE-2012-0394.yaml
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0394