CVE Vulnerabilities

CVE-2010-1871

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

Published: Aug 05, 2010 | Modified: Oct 22, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
6.8 IMPORTANT
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.

Weakness

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.

Affected Software

NameVendorStart VersionEnd Version
Jboss_enterprise_application_platformRedhat4.3.0 (including)4.3.0 (including)
Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 4RedHatjboss-seam2-0:2.0.2.FP-1.ep1.24.el4*
Red Hat JBoss Enterprise Application Platform 4.3 for RHEL 5RedHatjboss-seam2-0:2.0.2.FP-1.ep1.24.el5*

Potential Mitigations

  • If user-controlled data must be added to an expression interpreter, one or more of the following should be performed:

References