A vulnerability in Apache Struts 2 that would allow a potential attacker to execute arbitrary code on an affected system has been patched by Cisco at the end of last week; the security issue was initially reported in July 2010.The problem occurred because of improper sanitization of the input in the XWorks component in Apache Struts 2. A malcrafted Object-Graph Navigation Language (OGNL) expression could be used by an attacker to compromise a vulnerable system.As noted in the original report o…