CVE-2013-4212

Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:roller:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:roller:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:roller:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:roller:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://rollerweblogger.org/project/entry/apache_roller_5_0_2 - Patch () http://rollerweblogger.org/project/entry/apache_roller_5_0_2 - Patch
References () http://secunia.com/advisories/55862 - Vendor Advisory () http://secunia.com/advisories/55862 - Vendor Advisory
References () http://secunia.com/advisories/55877 - Vendor Advisory () http://secunia.com/advisories/55877 - Vendor Advisory
References () http://security.coverity.com/advisory/2013/Oct/remote-code-execution-in-apache-roller-via-ognl-injection.html - () http://security.coverity.com/advisory/2013/Oct/remote-code-execution-in-apache-roller-via-ognl-injection.html -
References () http://www.exploit-db.com/exploits/29859 - Exploit () http://www.exploit-db.com/exploits/29859 - Exploit
References () http://www.osvdb.org/100342 - () http://www.osvdb.org/100342 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/89239 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/89239 -

Information

Published : 2013-12-07 20:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4212

Mitre link : CVE-2013-4212

CVE.ORG link : CVE-2013-4212


JSON object : View

Products Affected

apache

  • roller
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')