OGNL Injection Vulnerability in Apache Roller by Apache
CVE-2013-4212

Currently unrated

Key Information:

Vendor
Apache
Status
Vendor
CVE Published:
7 December 2013

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 87%

Summary

In Apache Roller versions prior to 5.0.2, certain getText methods in the ActionSupport controller are susceptible to OGNL injection. This vulnerability enables remote attackers to execute arbitrary OGNL (Object-Graph Navigation Language) expressions by crafting inputs to parameters, such as the pageTitle parameter in a specific URL pattern. Successful exploitation could allow an attacker to manipulate the application’s behavior and potentially gain unauthorized access or execute arbitrary code.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

87% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.