CVE Vulnerabilities

CVE-2010-1871

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

Published: Aug 05, 2010 | Modified: Dec 19, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
6.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu

JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.

Weakness

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.

Affected Software

Name Vendor Start Version End Version
Jboss_enterprise_application_platform Redhat 4.3.0 (including) 4.3.0 (including)
Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 4 RedHat jboss-seam2-0:2.0.2.FP-1.ep1.24.el4 *
Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 5 RedHat jboss-seam2-0:2.0.2.FP-1.ep1.24.el5 *

Potential Mitigations

  • If user-controlled data must be added to an expression interpreter, one or more of the following should be performed:

References