CVE Vulnerabilities

CVE-2017-7536

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jan 10, 2018 | Modified: Nov 07, 2023
CVSS 3.x
7
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.4 MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security managers reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

Name Vendor Start Version End Version
Hibernate_validator Redhat 5.2.0 (including) 5.2.5 (excluding)
Hibernate_validator Redhat 5.3.0 (including) 5.3.6 (excluding)
Hibernate_validator Redhat 5.4.0 (including) 5.4.2 (excluding)

Potential Mitigations

References