Certain getText methods in the ActionSupport controller in Apache Roller prior to 5.0.2 allow remote malicious users to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache roller 4.0 |
||
apache roller 4.0.1 |
||
apache roller |
||
apache roller 5.0 |