Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:APACHE:ROLLER-OGNL-RCE

Severity

Critical

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Apache Roller OGNL Injection Remote Code Execution

Release Date

2014/01/07

Update Number

2332

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Apache Roller OGNL Injection Remote Code Execution


This signature detects attempts to exploit a known vulnerability against Apache Roller OGNL. A successful attack can lead to arbitrary code execution.

Extended Description

Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."

Affected Products

  • apache roller 4.0
  • apache roller 4.0.1
  • apache roller 5.0
  • apache roller up to 5.0.1

References

  • BugTraq: 63928
  • CVE: CVE-2013-4212

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out