Loading
Certain getText methods in the ActionSupport controller in Apache Roller before 5.0.2 allow remote attackers to execute arbitrary OGNL expressions via the first or second parameter, as demonstrated by the pageTitle parameter in the !getPageTitle sub-URL to roller-ui/login.rol, which uses a subclass of UIAction, aka "OGNL Injection."
Use CWE-94, Apache vendor hub and Roller product page to widen CVE-2013-4212 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2018-17198, CVE-2014-0030 and CVE-2021-33580 for nearby disclosures in the same product family.