HTTP: Apache Roller OGNL Injection Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Apache Roller OGNL. A successful attack can lead to arbitrary code execution.

Extended Description

Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."

Affected Products

Apache roller

Short Name
HTTP:APACHE:ROLLER-OGNL-RCE
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apache CVE-2013-4212 Code Execution Injection OGNL Remote Roller bid:63928
Release Date
01/08/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Apache

CVSS Score

6.8

Found a potential security threat?