The REST Plugin in Apache Struts 2.1.2 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax
bugzilla.redhat.com/show_bug.cgi?id=1488482
cwiki.apache.org/confluence/display/WW/S2-052
github.com/apache/struts
github.com/apache/struts/commit/19494718865f2fb7da5ea363de3822f87fbda26
github.com/apache/struts/commit/6dd6e5cfb7b5e020abffe7e8091bd63fe97c10a
lgtm.com/blog/apache_struts_CVE-2017-9805
nvd.nist.gov/vuln/detail/CVE-2017-9805
security.netapp.com/advisory/ntap-20170907-0001
struts.apache.org/docs/s2-052.html
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2
web.archive.org/web/20170909031344/www.securityfocus.com/bid/100609
web.archive.org/web/20170922053119/www.securitytracker.com/id/1039263
www.exploit-db.com/exploits/42627
www.kb.cert.org/vuls/id/112992