6.8
CVSSv2

CVE-2013-4212

Published: 07/12/2013 Updated: 29/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Certain getText methods in the ActionSupport controller in Apache Roller prior to 5.0.2 allow remote malicious users to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."

Vulnerable Product Search on Vulmon Subscribe to Product

apache roller 4.0

apache roller 4.0.1

apache roller

apache roller 5.0

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super(upda ...

Github Repositories

Custom Splunk Dashboard for Efficient Security Analysis Executive Summary In this project, we delve into the development and enhancement of an operational intelligence dashboard within a Security Information and Event Management (SIEM) system using Splunk The primary focus is on investigating suspicious activities and integrating new panels into the dashboard for more effic