OGNL Injection Vulnerability in Apache Roller by Apache
CVE-2013-4212
Key Information:
Badges
Summary
In Apache Roller versions prior to 5.0.2, certain getText methods in the ActionSupport controller are susceptible to OGNL injection. This vulnerability enables remote attackers to execute arbitrary OGNL (Object-Graph Navigation Language) expressions by crafting inputs to parameters, such as the pageTitle parameter in a specific URL pattern. Successful exploitation could allow an attacker to manipulate the application’s behavior and potentially gain unauthorized access or execute arbitrary code.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
87% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved