Automatic filtering via a Struts bean has been turned off,
which disables the Struts Validator and custom validation logic. This exposes
the application to other weaknesses related to insufficient input
validation.
When a Java application uses the Java Native Interface (JNI) to
call code written in another programming language, it can expose the application
to weaknesses in that code, even if those weaknesses cannot occur in
Java.
The software receives data from an upstream component, but does
not neutralize or incorrectly neutralizes CR and LF characters before the data
is included in outgoing HTTP headers.
Executing commands or loading libraries from an untrusted
source or in an untrusted environment can cause an application to execute
malicious commands (and payloads) on behalf of an
attacker.