Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f4j4-8x73-vjx4

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."

Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."

EPSS

Процентиль: 99%
0.87107
Высокий

Дефекты

CWE-94

Связанные уязвимости

nvd
около 12 лет назад

Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."

EPSS

Процентиль: 99%
0.87107
Высокий

Дефекты

CWE-94