This Metasploit module exploits a remote code execution vulnerability in Apache Struts versions 2.3 through 2.3.4, and 2.5 through 2.5.16. Remote code execution can be performed via an endpoint that makes use of a redirect action. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk.
d4db47de622ab194cae5e05a485e3f4743601277e19a6aa2f5275bcad5350dab
Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.
abe49c2998c4daa60886325a8a939490e797caab4d4c51bc670b8d832053b6d4