|
Message-ID: <CAF1aazCpJPNS42M5+8gAmyBQbcMBFcRe4g_e7O6U+rG8SjM6LA@mail.gmail.com> Date: Mon, 30 Mar 2015 16:11:33 -0400 From: Dave <snoopdave@...il.com> To: security@...che.org, oss-security@...ts.openwall.com, bugtraq@...urityfocus.com Subject: Fwd: CVE-2015-0249: Apache Roller allows admin users to execute arbitrary Java code ---------- Forwarded message ---------- From: Dave <snoopdave@...il.com> Date: Tue, Mar 24, 2015 at 7:22 PM Subject: CVE-2015-0249: Apache Roller allows admin users to execute arbitrary Java code To: "dev@...ler.apache.org" <dev@...ler.apache.org>, user@...ler.apache.org Severity: Important Vendor: The Apache Software Foundation Versions Affected: Roller 5.1.1 Roller 5.1 The unsupported pre-Roller 5.1 versions may also be affected Description: A Roller user with Admin-level access to a weblog can edit a weblog page template and use special Velocity syntax to execute Java code on the server. Mitigation: There are several ways you can fix this vulnerability: 1) Upgrade to the latest version of Roller, which is now 5.1.2. 2) Or, add the following line to Roller's velocity.properties file: runtime.introspector.uberspect=org.apache.velocity.util.introspection.SecureUberspector 3) Or, disable template editing on your Roller system by un-checking the Allow Custom Themes setting in the Server Admin -> Configuration page, Theme Settings section. Credit: This issue was discovered by Gregory Draperi.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.