cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-46911,https://securityvulnerability.io/vulnerability/CVE-2024-46911,Privilege Escalation Vulnerability Affects Apache Roller Before 6.1.4,"Cross-site Resource Forgery (CSRF), Privilege escalation vulnerability in Apache Roller. On multi-blog/user Roller websites, by default weblog owners are trusted to publish arbitrary weblog content and this combined with a deficiency in Roller's CSRF protections allowed an escalation of privileges attack. This issue affects Apache Roller before 6.1.4. Roller users who run multi-blog/user Roller websites are recommended to upgrade to version 6.1.4, which fixes the issue. Roller 6.1.4 release announcement:  https://lists.apache.org/thread/3c3f6rwqptyw6wdc95654fq5vlosqdpw",Apache,Apache Roller,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-14T09:15:00.000Z,0 CVE-2024-25090,https://securityvulnerability.io/vulnerability/CVE-2024-25090,XSS vulnerability in Apache Roller allows authenticated users to perform attacks,"Insufficient input validation and sanitation in Profile name & screenname, Bookmark name & description and blogroll name features in all versions of Apache Roller on all platforms allows an authenticated user to perform an XSS attack. Mitigation: if you do not have Roller configured for untrusted users, then you need to do nothing because you trust your users to author raw HTML and other web content. If you are running with untrusted users then you should upgrade to Roller 6.1.3. This issue affects Apache Roller: from 5.0.0 before 6.1.3. Users are recommended to upgrade to version 6.1.3, which fixes the issue.",Apache,Apache Roller,5.4,MEDIUM,0.0017900000093504786,false,,false,false,false,,,false,false,,2024-07-26T08:36:47.021Z,0 CVE-2023-37581,https://securityvulnerability.io/vulnerability/CVE-2023-37581,"Apache Roller: Roller's weblog category, weblog settings and file-upload features did not properly sanitize input could be exploited to perform Reflected Cross Site Scripting (XSS) even on a Roller site configured for untrusted users.","Insufficient input validation and sanitation in Weblog Category name, Website About and File Upload features in all versions of Apache Roller on all platforms allows an authenticated user to perform an XSS attack. Mitigation: if you do not have Roller configured for untrusted users, then you need to do nothing because you trust your users to author raw HTML and other web content. If you are running with untrusted users then you should upgrade to Roller 6.1.2 and you should disable Roller's File Upload feature.  ",Apache,Apache Roller,5.4,MEDIUM,0.0052999998442828655,false,,false,false,false,,,false,false,,2023-08-06T08:15:00.000Z,0 CVE-2021-33580,https://securityvulnerability.io/vulnerability/CVE-2021-33580,regex injection leading to DoS,"User controlled `request.getHeader(""Referer"")`, `request.getRequestURL()` and `request.getQueryString()` are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.",Apache,Apache Roller,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2021-08-18T07:50:10.000Z,0 CVE-2019-0234,https://securityvulnerability.io/vulnerability/CVE-2019-0234,,"A Reflected Cross-site Scripting (XSS) vulnerability exists in Apache Roller. Roller's Math Comment Authenticator did not property sanitize user input and could be exploited to perform Reflected Cross Site Scripting (XSS). The mitigation for this vulnerability is to upgrade to the latest version of Roller, which is now Roller 5.2.3.",Apache,Apache Roller,6.1,MEDIUM,0.0020000000949949026,false,,false,false,false,,,false,false,,2019-07-15T21:13:14.000Z,0 CVE-2018-17198,https://securityvulnerability.io/vulnerability/CVE-2018-17198,,"Server-side Request Forgery (SSRF) and File Enumeration vulnerability in Apache Roller 5.2.1, 5.2.0 and earlier unsupported versions relies on Java SAX Parser to implement its XML-RPC interface and by default that parser supports external entities in XML DOCTYPE, which opens Roller up to SSRF / File Enumeration vulnerability. Note that this vulnerability exists even if Roller XML-RPC interface is disable via the Roller web admin UI. Mitigation: There are a couple of ways you can fix this vulnerability: 1) Upgrade to the latest version of Roller, which is now 5.2.2 2) Or, edit the Roller web.xml file and comment out the XML-RPC Servlet mapping as shown below: ",Apache,Apache Roller,9.8,CRITICAL,0.0024500000290572643,false,,false,false,false,,,false,false,,2019-05-28T17:08:11.000Z,0